Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential
damages in connection with the furnishing, performance, or use of this material.
This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or
translated into another language without the prior written consent of Hewlett-Packard. The information is provided “as is” without warranty of any
kind and is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
Product names mentioned herein may be trademarks of their respective companies.
Microsoft, Windows, Windows NT, and Windows XP are U.S. registered trademarks of Microsoft Corporation.
HP StorageWorks 4/8 SAN Switch, 4/16 SAN Switch, Brocade 4Gb SAN Switch for HP p-Class
BladeSystem, Brocade 4Gb SAN Switch for HP c-Class BladeSystem, SAN Switch 4/32, 4/64 SAN Switch,
Brocade 4012Brocade 4Gb SAN Switch for HP p-Class BladeSystem
Brocade 4024Brocade 4Gb SAN Switch for HP c-Class BladeSystem
Brocade 5000HP StorageWorks SAN Switch 4/32B
Brocade DCX BackboneHP StorageWorks DC SAN Backbone Director (short
FC10-6 Blade
FC8-16 Blade
FC8-32 Blade
B-Series Multi-protocol (MP) Router blade
HP StorageWorks 4/48 SAN Director Blade
HP StorageWorks iSCSI Director Blade (compatible with
HP StorageWorks 4/256 SAN Director only)
name, DC Director)
HP StorageWorks SAN Director 6 Port 10Gb FC blade
HP StorageWorks SAN Director16 Port 8Gb FC blade
HP StorageWorks SAN Director 32 Port 8Gb FC blade
FC8-48 Blade
HP StorageWorks SAN Director 48 Port 8Gb FC blade
Fabric OS 6.x administrator guide19
Intended audience
This guide is intended for system administrators with knowledge of:
• Storage area networks
• HP StorageWorks Fibre Channel SAN switches
Related documentation
The following documents provide related information:
• HP StorageWorks Fabric OS 6.x release notes
•
HP StorageWorks DC SAN Backbane Director hardware reference guide
You can find these documents from the Manuals page of the HP Business Support Center website:
http://www.hp.com/support/manuals
In the Storage section, click Storage Networking and then select your product.
Document conventions and symbols
Table 2 Document conventions
ConventionElement
Blue text: Table 1Cross-reference links and e-mail addresses
Blue, underlined text:
http://www.hp.com
Bold text
Italics textText emphasis
Monospace text• File and directory names
Monospace, italic text• Code variables
Monospace, bold textEmphasized monospace text
WARNING!Indicates that failure to follow directions could result in bodily harm or death.
Website addresses
• Key that are pressed
• Text typed into a GUI element, such as into a box
• GUI elements that are clicked or selected, such as menu and list
items, buttons, tabs, and check boxes
• System output
• Code
• Commands, their arguments, and argument values
• Command variables
20
CAUTION: Indicates that failure to follow directions could result in damage to equipment or data.
IMPORTANT: Provides clarifying information or specific instructions.
NOTE: Provides additional information.
TIP:Provides helpful hints and shortcuts.
Rack stability
Rack stability protects personnel and equipment.
WARNING!
To reduce the risk of personal injury or damage to equipment:
• Extend leveling jacks to the floor.
• Ensure that the full weight of the rack rests on the leveling jacks.
• Install stabilizing feet on the rack.
• In multiple-rack installations, secure racks together.
• Extend only one rack component at a time. Racks may become unstable if more than one component is
extended.
HP technical support
For worldwide technical support information, see the HP support website:
http://www.hp.com/support/
Before contacting HP, collect the following information:
• Product model names and numbers
• Technical support registration number (if applicable)
• Product serial numbers
• Error messages
• Operating system type and revision level
• Detailed questions
Customer self repair
HP customer self repair (CSR) programs allow you to repair your StorageWorks product. If a CSR part
needs replacing, HP ships the part directly to you so that you can install it at your convenience. Some parts
do not qualify for CSR. Your HP-authorized service provider will determine whether a repair can be
accomplished by CSR.
For more information about CSR, contact your local service provider. For North America, see the CSR
website:
http://www.hp.com/go/selfrepair
Product warranties
For information about HP StorageWorks product warranties, see the warranty information website:
http://www.hp.com/go/storagewarranty
Fabric OS 6.x administrator guide21
Subscription service
HP recommends that you register your product at the Subscriber's Choice for Business website:
http://www.hp.com/go/e-updates
After registering, you will receive e-mail notification of product enhancements, new driver versions,
firmware updates, and other product resources.
HP websites
For additional product information, see the following HP websites:
• http://www.hp.com
• http://www.hp.com/go/storage
• http://www.hp.com/support/manuals
Documentation feedback
HP welcomes your feedback.
To make comments and suggestions about product documentation, please send a message to
storagedocs.feedback@hp.com. All submissions become the property of HP.
.
22
1Standard features
This chapter describes how to configure your HP StorageWorks SAN using the Fabric OS Command Line
Interface (CLI). Before you can configure a Storage Area Network (SAN), you must power-up the Director
or switch and blades, and then set the IP addresses of those devices. Although this chapter focuses on
configuring a SAN using the CLI, you can also use the following methods to configure a SAN:
• Web Tools
For Web Tools procedures, see the Web Tools Administrator’s Guide.
• Fabric Manager
For Fabric Manager procedures, see the Fabric Manager Administrator’s Guide.
Overview
As a result of the differences between fixed-port and variable-port devices, procedures sometimes differ
among HP switch models. As new models are introduced, new features sometimes apply only to specific
switches.
When procedures or parts of procedures apply to some models but not others, this guide identifies the
specifics for each model. For example, a number of procedures that apply only to variable-port devices are
found in ”Configuring Directors” on page 193.
Although many different software and hardware configurations are tested and supported, documenting all
possible configurations and scenarios is beyond the scope of this document. In some cases, earlier releases
are highlighted to present considerations for interoperating with them.
The hardware reference manuals for HP products describe how to power up devices and set their IP
addresses. After the IP address is set, you can use the CLI procedures contained in this guide.
For additional information about the commands used in the procedures, see online help or the Fabric OS Command Reference.
Using the CLI
Fabric OS 6.x uses Role-Based Access Control (RBAC) to control access to all Fabric OS operations. You
can display a list of all command help topics for a given login level, For example, if you are logged in as
user and enter the help command, a list of all user-level commands that can be executed is displayed. The
same rule applies to the admin, securityAdmin, and the switchAdmin roles.
NOTE: When command examples in this guide show user input enclosed in quotation marks, the
quotation marks are required.
You can enter th e help [| more] (pipe more) command with no specific command and all commands
display. The | more argument displays the command one page at a time. Or, you can enter help
<command>, where command is the name of the command for which you need specific information.
Fabric OS 6.x administrator guide23
The following commands provide help files for specific topics to understand configuring your SAN:
diagHelpDiagnostic help information
ficonHelpFICON help information
fwHelpFabric Watch help information
iscsiHelp iSCSI help informations
licenseHelpLicense help information
perfHelpPerformance Monitoring help information
routeHelpRouting help information
trackChangesHelp Track Changes help information
zoneHelpZoning help information
Connecting to the CLI
Read this section for procedures.
Using Telnet or SSH session
Connect to the Fabric OS through a Telnet or SSH connection or through a console session on the serial
port. The switch must also be physically connected to the network. If the switch network interface is not
configured or the switch has been disconnected from the network, use a console session on the serial port
as described in the next section.
NOTE: To automatically configure the network interface on a DHCP-enabled switch, plug the switch into
the network and power it on. The DHCP client automatically gets the IP and gateway addresses from the
DHCP server. The DHCP server must be on the same subnet as the switch. See ”Configuring DHCP” on
page 29 for more details.
Rules for Telnet connections:
• Never change the IP address of the switch while two Telnet sessions are active; if you do, your next
attempt to log in fails. To recover, gain access to the switch by one of these methods:
• You can use Web Tools to perform a fast boot. When the switch comes up, the Telnet quota is
cleared. (For instructions on performing a fast boot with Web Tools, see the Web Tools Administrator’s Guide.)
• If you have the required privileges, you can connect through the serial port, log in as root, and use
operating system commands to identify and kill the Telnet processes without disrupting the fabric.
• For admin level accounts, Fabric OS limits the number of simultaneous Telnet sessions per switch to two.
For more details on session limits, see ”Configuring the Telnet protocol” on page 87 and ”Managing
user accounts” on page 55.
To connect using Telnet:
1. Verify that the switch’s network interface is configured and that it is connected to the IP network through
the RJ-45 Ethernet port.
Switches in the fabric that are not connected through the Ethernet can be managed through switches
that are using IP over Fibre Channel. The embedded port must have an assigned IP address.
2. Open a Telnet connection using the IP address of the logical switch to which you want to connect.
Enter the account ID at the login prompt.
See ”Changing passwords” on page 25 for instructions on how to log in for the first time.
3. Enter the password.
If you have not changed the system passwords from the default, you are prompted to change them.
Enter the new system passwords, or press Ctrl-C to skip the password prompts. See ”Changing default
account passwords at login” on page 26.
24Standard features
4. Verify that the login was successful.
The prompt displays the switch name and user ID to which you are connected.
login: admin
password: xxxxxxx
switch:admin>
Using a console session on the serial port
Note the following behaviors for serial connections:
• Some procedures require that you connect through the serial port; for example, setting the IP address or
setting the boot PROM password.
• If you are using a Fabric OS version prior to 6.x, and secure mode is enabled, connect through the
serial port of the primary FCS switch.
• 4/256 SAN Director and DC Director: You can connect to CP0 or CP1 using either of the two
serial ports.
To connect through the serial port:
1. Connect the serial cable to the serial port on the switch and to an RS-232 serial port on the workstation.
If the serial port on the workstation is RJ-45 instead of RS-232, remove the adapter on the end of the
serial cable and insert the exposed RJ-45 connector into the RJ-45 serial port on the workstation.
2. Open a terminal emulator application (such as HyperTerminal on a PC, or TERM, TIP, or Kermit in a
UNIX environment), and configure the application as follows:
• In a Windows environment:
ParameterValue
Bits per second9600
Databits8
ParityNone
Stop bits1
Flow controlNone
• In a UNIX environment, enter the following string at the prompt:
tip /dev/ttyb -9600
If ttyb is already in use, use ttya instead and enter the following string at the prompt:
tip /dev/ttya -9600
Changing passwords
The switch automatically prompts you to change the default account passwords after logging in for the first
time. If you do not change the passwords, the switch prompts you after each subsequent login until all the
default passwords have been changed.
NOTE: The default account passwords can be changed from their original value only when prompted
immediately following the login; the passwords cannot be changed using the passwd command later in
the session. If you skip the prompt, and then later decide to change the passwords, log out and then back
in.
The default accounts on the switch are admin, user, root, and factory. Use the default administrative
account as shown in Table 3 to log into the switch for the first time and to perform the basic configuration
tasks.
Fabric OS 6.x administrator guide25
Every logical switch (domain) has a set of default accounts. The root and factory default accounts are
reserved for development and manufacturing. The user account is primarily used for system monitoring. For
more information on default accounts, see ”About the default accounts” on page 59.
Table 3 describes the default administrative accounts for switches by model number.
Table 3 Default administrative account names and passwords
ModelAdministrative
account
HP StorageWorks 4/8 SAN Switch, 4/16 SAN
Switch, Brocade 4Gb SAN Switch for HP p-Class
BladeSystem, Brocade 4Gb SAN Switch for HP
c-Class BladeSystem, SAN Switch 4/32, 4/64 SAN
Switch, SAN Switch 4/32B, 400 Multi-protocol Router
4/256 SAN Director and DC SAN Backbone Director
(short name, DC Director)
adminpassword
adminpassword
Changing default account passwords at login
The change default account passwords prompt accepts a maximum of eight characters. Any characters
beyond the eighth character are ignored. Only the default password is subject to the eight character limit.
User-defined passwords can have 8 to 40 characters. They must begin with an alphabetic character and
can include numeric characters, the period (.), and the underscore ( _ ). They are case-sensitive, and they
are not displayed when you enter them on the command line.
Record the passwords exactly as entered and store them in a secure place because recovering passwords
requires significant effort and fabric downtime. Although the root and factory accounts are not meant for
general use, change their passwords if prompted to do so and save the passwords in case they are needed
for recovery purposes.
To change the default account passwords at login:
1. Connect to the switch and log in using the default administrative account.
2. At each of the “Enter new password” prompts, either enter a new password or skip the prompt.
To skip a single prompt press Enter. To skip all of the remaining prompts press Ctrl-c.
login: admin
Password:
Please change your passwords now.
Use Control-C to exit or press 'Enter' key to proceed.
for user - root
Changing password for root
Enter new password: ********
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - factory
Changing password for factory
Enter new password: ********
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - admin
Changing password for admin
Enter new password: ********
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - user
Changing password for user
Enter new password: ********
Password
26Standard features
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
switch:admin>
Configuring the Ethernet interface
You can use Dynamic Host Configuration Protocol (DHCP) for the Ethernet network interface configuration.
The Ethernet (network) interface provides management access, including direct access to the Fabric OS
CLI, and allows other tools, such as Web Tools, to interact with the switch.
You can continue to use a static Ethernet addressing system or allow the DHCP client to automatically
acquire Ethernet addresses. Configure the Ethernet interface IP, subnet mask, and gateway addresses in
one of the following manners:
• ”Setting static Ethernet addresses” on page 28
• ”Configuring DHCP” on page 29
When you change the Ethernet interface settings, open connections such as SSH or Telnet may be
dropped. Reconnect using the new Ethernet IP information or change the Ethernet settings using a console
session through the serial port to maintain your session through the change. You must connect through the
serial port to set the Ethernet IP address if the Ethernet network interface is not configured already.
Displaying the network interface settings
If an IP address has not been assigned to the network interface (Ethernet), you must connect to the Fabric
OS CLI using a console session on the serial port. For more information, see ”Using a console session on
the serial port” on page 25. Otherwise, connect using SSH.
To display the network interface settings:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ipAddrShow command.
SWITCH
Ethernet IP Address: 102.108.153.238
Ethernet Subnetmask: 255.255.255.0
Fibre Channel IP Address: none
Fibre Channel Subnetmask: 255.255.0.0
Gateway IP Address: 102.108.153.1
DHCP: Off
IPv6 Autoconfiguration Enabled: No
Local IPv6 Addresses:
static 1080::9:800:400c:416a/64
If the Ethernet IP address, subnet mask, and gateway address are displayed, then the network interface
is configured. Verify that the information is correct. If DHCP is enabled, the network interface
information was acquired from the DHCP server.
NOTE: You can use either IPv4 or IPv6 with a classless inter-domain routing (CIDR) block notation to set
up your IP addresses.
Fabric OS 6.x administrator guide27
Setting static Ethernet addresses
Use static Ethernet network interface addresses on HP StorageWorks 2/128, 4/256 SAN Director, DC
Director models, and in environments where DHCP service is not available. To use static addresses for the
Ethernet interface, you must first disable DHCP. You may enter static Ethernet information and disable
DHCP at the same time. Refer to ”Configuring DHCP” on page 29 for more information.
If you choose not to use DHCP or to specify an IP address for your switch Ethernet interface, you can do so
by entering none or 0.0.0.0 in the Ethernet IP address field.
IMPORTANT: IP address 0.0.0.0 is not supported in Fabric OS versions earlier than 5.2.0.
To set static addresses for the Ethernet network interface:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the following command to set the IPv4 address:
switch:admin> ipaddrset
Ethernet IP Address [192.168.74.102]:
Ethernet Subnetmask [255.255.255.0]:
Fibre Channel IP Address [220.220.220.2]:
Fibre Channel Subnetmask [255.255.0.0]:
Gateway IP Address [192.168.74.1]:
DHCP [OFF]: off
or to set an IPv6 address on a switch:
switch:admin> ipaddrset -ipv6 --add 1080::8:800:200C:417A/64
IP address is being changed...Done.
Example of setting logical switch (sw0)'s IPv6 address on a Director:
director:admin> ipaddrset -ipv6 -sw 0 --add 1080::8:800:200C:417B/64
IP address is being changed...Done.
Enter the network information in dotted decimal notation for the Ethernet IPv4 address and in semicolon
separated notation for IPv6. Enter the Ethernet Subnetmask and Gateway Address at the prompts. Skip
Fibre Channel prompts by pressing Enter. Disable DHCP by entering OFF.
On an AP blade, configure the two external Ethernet interfaces to two different subnets, or if two
subnets are not present, configure one of the interfaces and leave the other unconfigured. Otherwise
the following message will show up and also blade status may go into a faulty state after a reboot.
By default, some HP switches have DHCP enabled; check the latest Fabric OS 6.x release notes for a
complete list of switches. The 4/256 SAN Director and DC SAN Backbone Director (short name, DC
Director) do not support DHCP.
The Fabric OS DHCP client supports the following parameters:
• External Ethernet port IP addresses and subnet masks
• Default gateway IP address
The DHCP client uses a DHCP vendor class identifier that allows DHCP servers to determine that the
Discovers and Requests are coming from a switch. The vendor class identifier is the string “BROCADE”
followed by the SWBD model number of the platform. For example, the vendor class identifier for a request
from an HP StorageWorks DC Director is “BROCADESWBD62.”
IMPORTANT: The client conforms to the latest IETF Draft Standard RFCs for IPv4, IPv6, and DHCP.
Enabling DHCP
Connect the DHCP-enabled switch to the network, power on the switch, and the switch automatically
obtains the Ethernet IP address, Ethernet subnet mask, and default gateway address from the DHCP server.
The DHCP client can only connect to a DHCP server on the same subnet as the switch. Do not enable
DHCP if the DHCP server is not on the same subnet as the switch.
Enabling DHCP after the Ethernet information has been configured releases the current Ethernet network
interface settings, including Ethernet IP, Ethernet Subnetmask, and Gateway. The Fibre Channel (FC) IP
address and subnet mask is static and is not affected by DHCP; see ”Setting static Ethernet addresses” on
page 28 for instructions on setting the FC IP address.
To enable DHCP:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ipaddrset command.
3. If already set up, skip the Ethernet IP address, Ethernet subnet mask, Fibre Channel IP address and
subnet mask prompts by pressing Enter.
4. When you are prompted for DHCP[Off], enable it by entering at the prompt:
switch:admin> ipaddrset
Ethernet IP Address [192.168.74.102]:
Ethernet Subnetmask [255.255.255.0]:
Fibre Channel IP Address [220.220.220.2]:
Fibre Channel Subnetmask [255.255.0.0]:
Gateway IP Address [192.168.74.1]:
DHCP [Off]:on
Disabling DHCP
When you disable DHCP, enter the static Ethernet IP address and subnet mask of the switch and default
gateway address. Otherwise, the Ethernet settings may conflict with other addresses assigned by the DHCP
server on the network.
To disable DHCP:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ipaddrset command.
3. Enter the network information in dotted decimal notation for the Ethernet IP address, Ethernet
Subnetmask, and Gateway Address at the prompts. If a static Ethernet address is not available when
you disable DHCP, enter 0.0.0.0 at the Ethernet IP address prompt. Skip Fibre Channel prompts by
pressing Enter.
Fabric OS 6.x administrator guide29
4. When you are prompted for DHCP[On], disable it by entering off.
switch:admin> ipaddrset
Ethernet IP Address [192.168.74.102]:
Ethernet Subnetmask [255.255.255.0]:
Fibre Channel IP Address [220.220.220.2]:
Fibre Channel Subnetmask [255.255.0.0]:
Gateway IP Address [192.168.74.1]:
DHCP [On]:off
Setting the date and time
Switches maintain the current date and time inside a battery-backed real-time clock (RTC) circuit. Date and
time are used for logging events. Switch operation does not depend on the date and time; a switch with an
incorrect date and time value still functions properly. However, because the date and time are used for
logging, error detection, and troubleshooting, you should set them correctly.
Authorization access to set or change the date and time for a switch is role-based. For an understanding of
role-based access, refer to ”Using Role-Based Access Control (RBAC)” on page 56.
IMPORTANT: If you are running a Fabric OS version earlier than 6.x and secure mode is not enabled, a
change in date or time to one switch is forwarded to the principal switch and distributed to the fabric. If
secure mode is enabled, date or time changes can be made only on the primary FCS switch and
distributed to the fabric.
To set the date and time:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the date command, using the following syntax:
date "mmddHHMMyy"
The values represent the following:
• mm is the month; valid values are 01 through 12.
• dd is the date; valid values are 01 through 31.
• HH is the hour; valid values are 00 through 23.
• MM is minutes; valid values are 00 through 59.
• yy is the year; valid values are 00 through 99 (values greater than 69 are interpreted as 1970
through 1999, and values less than 70 are interpreted as 2000-2069).
switch:admin> date
Fri Sep 29 17:01:48 UTC 2007
switch:admin> date "0927123007"
Thu Sep 27 12:30:00 UTC 2007
switch:admin>
For details about how to change time zones, see the tsTimeZone command in the Fabric OS Command
Reference.
Setting time zones
You can set the time zone for a switch by name. You can specify the setting using country and city or time
zone parameters. Switch operation does not depend on a date and time setting. However, having an
accurate time setting is needed for accurate logging and audit tracking.
If the time zone is not set with the new options, the switch retains the offset time zone settings. The
TSTIMEZONE command includes an option to revert to the prior time zone format. For more information
about the
30Standard features
--old option, see the Fabric OS Command Reference.
IMPORTANT: If you are downgrading to a Fabric OS version earlier than 6.x, or retaining the offset
format, see prior versions of the Fabric OS Administrator’s Guide for detailed information about setting
time zones using the offset format. See ”About the firmware download process” on page 163 for time zone
downgrading considerations.
You can set the time zone for a switch using the tsTimeZone command. The tsTimeZone command
allows you to perform the following tasks:
• Display all of the time zones supported in the firmware
• Set the time zone based on a country and city combination or based on a time zone ID such as PST
The time zone setting has the following characteristics:
• Users can view the time zone settings. However, only those with administrative permissions can set the
time zones.
• The tsTimeZone setting automatically adjusts for Daylight Savings Time.
• Changing the time zone on a switch updates the local time zone setup and is reflected in local time
calculations.
• By default, all switches are in the GMT time zone (0,0). If all switches in a fabric are in one time zone,
it is possible for you to keep the time zone setup at the default setting.
• System services that have already started will reflect the time zone changes only after the next reboot.
• Time zone settings persist across failover for High Availability.
Setting the time zone on a dual domain Director has the following characteristics:
• Updating the time zone on any switch updates the entire Director.
• The time zone of the entire Director is the time zone of switch 0.
The following procedure describes how to set the time zone for a switch. You must perform the procedure
on all switches for which the time zone must be set. However, you only need to set the time zone once on
each switch, because the value is written to nonvolatile memory.
To set the time zone:
1. Connect to the switch and log in using an account assigned to the admin role.
•Use tsTimeZone with no parameters to display the current time zone setting
•Use
--interactive to list all of the time zones supported by the firmware.
•Use timezone_fmt to set the time zone by Country/City or by time zone ID, such as PST.
The following example shows how to display the current time zone setup and how to change the time zone
to US/Central.
switch:admin> tstimezone
Time Zone : US/Pacific
switch:admin> tstimezone US/Central
switch:admin> tstimezone
Time Zone : US/Central
Fabric OS 6.x administrator guide31
The following procedure describes how to set the current time zone using interactive mode to Pacific
Standard Time.
To set the time zone interactively:
1. Type th e tsTimeZone command as follows:
switch:admin> tstimezone --interactive
2. You are prompted to select a general location.
Please identify a location so that time zone rules can be set correctly.
3. Enter the appropriate number or Ctrl-D to quit.
4. At the prompt, select a country location.
5. At the prompt, enter the appropriate number to specify the time zone region or Ctrl-D to quit.
Synchronizing local time using NTP
You can synchronize the local time of the principal or primary fabric configuration server (FCS) switch to a
maximum of eight external network time protocol (NTP) servers. To keep the time in your SAN current, it is
recommended that the principal or primary-FCS switch has its time synchronized with at least one external
NTP server. The other switches in the fabric will automatically take their time from the principal or
primary-FCS switch.
All switches in the fabric maintain the current clock server value in non-volatile memory. By default, this
value is the local clock server <LOCL> of the principal or primary FCS switch. Changes to the clock server
value on the principal or primary FCS switch are propagated to all switches in the fabric.
When a new switch enters the fabric, the time server daemon of the principal or primary FCS switch sends
out the addresses of all existing clock servers and the time to the new switch. If a switch with Fabric OS
5.3.0 or later has entered the fabric it will be able to store the list and the active servers; pre-5.3.0 Fabric
OS switches will ignore the new list parameter in the payload and will update only the active server
address.
If the active NTP server configured is IPv6, then distributing the same in the fabric will not be possible to
switches earlier than Fabric OS 5.3.0 because IPv6 is supported for Fabric OS version 5.3.0 and later. The
default value LOCL will be distributed to pre-5.3.0 switches.
To synchronize local time with an external source:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the tsClockServer command:
switch:admin> tsclockserver "<ntp1;ntp2>"
where ntp1 is the IP address or DNS name of the first NTP server, which the switch must be able to
access. The second ntp2 is the second NTP server and is optional. The operand “<ntp1;ntp2>” is
optional; by default, this value is LOCL, which uses the local clock of the principal or primary switch as
the clock server.
The tsClockServer command accepts multiple server addresses in either IPv4, IPv6, or DNS name
formats. When multiple NTP server addresses are passed, tsClockServer sets the first obtainable
address as the active NTP server. The rest will be stored as backup servers that can take over if the
active NTP server fails. The principal or primary FCS switch synchronizes its time with the NTP server
every 64 seconds.
The following example shows how to set up more than one NTP server using a DNS name:
switch:admin> tsclockserver "10.32.170.1;10.32.170.2;ntp.localdomain.net"
Updating Clock Server configuration...done.
Updated with the NTP servers
Changes to the clock server value on the principal or primary FCS switch are
propagated to all switches in the fabric.
Customizing switch names
Switches can be identified by IP address, Domain ID, World Wide Name (WWN), or by customized
switch names that are unique and meaningful.
Switch names can be from 1 to 15 characters long, must begin with a letter, and can contain letters,
numbers, or the underscore character. It is not necessary to use quotation marks.
NOTE: Changing the switch name causes a domain address format RSCN (registered state change
notification) to be issued and may be disruptive to the fabric.
To customize the switch name:
1. Open a Telnet session for each logical switch and enter the switchName command.
2. Connect to the switch and log in using an admin account.
3. Enter the switchName command, using the following syntax:
switchname "newname"
where newname is the new name for the switch.
4. Record the new switch name for future reference.
5. Record the new switch name for the second domain for future reference.
Working with Domain IDs
Although Domain IDs are assigned dynamically when a switch is enabled, you can reset them manually so
that you can control the ID number or resolve a Domain ID conflict when you merge fabrics.
If a switch has a Domain ID when it is enabled, and that Domain ID conflicts with a switch in the fabric, the
conflict is automatically resolved. The process can take several seconds, during which time traffic is
delayed.
The default Domain ID for HP switches is 1.
NOTE: Do not use Domain ID 0. The use of this Domain ID can cause the switch to reboot continuously.
Avoid changing the Domain ID on the FCS in secure mode. To minimize down time, change the Domain
IDs on the other switches in the fabric.
To display Domain IDs:
1. Connect to a switch and log in as admin.
2. Enter the fabricShow command.
Fabric information is displayed, including the Domain ID (D_ID)
switch:admin> fabricshow
Switch ID Worldwide Name Enet IP Addr FC IP Addr Name
Switch ID — The switch Domain_ID and embedded port D_ID
Worldwide Name — The switch WWN
Enet IP Addr — The switch Ethernet IP address for IPv4 and IPv6 configured switches. For IPv6
switches, only the static IP address displays
FC IP Addr —The switch FC IP address
Name —The switch symbolic name. An arrow (>) indicates the principal switch.
To set the Domain ID:
1. Connect to the switch and log in using an admin account.
2. Enter the switchDisable command to disable the switch.
3. Enter the configure command.
4. Enter y after the Fabric
Fabric parameters (yes, y, no, n): [no] y
5. Enter a unique Domain ID at the Domain prompt. Use a Domain ID value from 1 through 239 for
normal operating mode (FCSW compatible):
Domain: (1..239) [1] 3
6. Respond to the remaining prompts, or press Ctrl-D to accept the other settings and exit.
7. Enter the switchEnable command to re-enable the switch.
parameters prompt:
Licensed features
You need the following items for each feature that needs to be licensed:
• Transaction key in the paperpack document supplied with the switch software. Or, when you purchased
a license, you received a transaction key to use for generating a software license key.
• License ID. To see a switch license ID, issue the licenseIdShow command.
Feature licenses may be part of the licensed paperpack supplied with your switch software; if not, you can
purchase licenses separately from HP. License keys are provided on a per-product and per-feature basis.
Each switch within a fabric will need its own licensing.
NOTE: To preserve licenses on your switch, perform a configupload prior to upgrading or
downgrading your Fabric OS.
If you downgrade your Fabric OS to the version earlier than 6.x, some licenses associated with specific
features of Fabric OS 6.x may not work.
Licenses can be associated with a feature version or a blade type.
• If a feature has a version-based license, that license is valid only for a particular version of the feature.
If you want a newer version of the feature, you must purchase a new license.
Version upgrade: For example, a zoning license that is for Fabric OS version 6.x is added. You can
add another zoning license with a version greater than 5.2.0 and above without removing the zoning
license for Fabric OS 5.2.0. Upgrading is allowed, but downgrading is not supported.
If a license is not version-based, then it is valid for all versions of the feature.
• If a license is associated with a blade type, the licensed feature can be used only with the associated
blade; if you want to use the feature on a second blade, you must purchase an additional license.
34Standard features
Generating a license key
To generate a license key:
1. If you already have a license key, go to ”Activating a license key” on page 35to activate.
If you do not have a license key, launch an Internet browser and go to:
http://webkey.external.hp.com/welcome.asp
The Hewlett-Packard Authorization Center website main menu displays.
2. Click Generate a license key.
The HP StorageWorks Software License Key instruction page opens:h
3. Enter the information in the required fields.
4. Follow the onscreen instructions to generate multiple license keys if applicable.
5. Click Next. A verification screen appears.
Verify that the information is correct. Click Submit if the information displayed is correct. If the
information is incorrect, click Previous and change the information.
6. Click Submit.
7. An information screen displays the license keys. You also receive an e-mail from the HP licensing
company.
8. Activate the license keys. Go to ”Activating a license key” on page 35.
Activating a license key
To activate and verify the license:
1. Connect to the switch and log in using an admin account.
2. Activate the license using the licenseAdd command.
switch:admin> licenseadd "key"
The transaction key is case sensitive, so it must be entered exactly as it appears. To lessen the chance of
error, copy and paste the transaction key. The quotation marks are optional.
For 4/256 SAN Director and DC SAN Backbone Director (short name, DC Director) models, licenses
are effective on both CP blades, but are valid only when the CP blade is inserted into a Director that
has an appropriate license ID stored in the WWN card. If a CP is moved from one Director to another,
the license works in the new Director only if the WWN card is the same in the new Director.
Otherwise, you must transfer licenses from the old WWN to the new WWN.
For example, if you swap one CP blade at a time, or replace a single CP blade, then the existing CP
blade (the active CP blade) propagates the licenses to the new CP blade.
If you move a standby CP from one Director to another, then the active CP will propagate its
configuration (including license keys).
Fabric OS 6.x administrator guide35
3. Verify that the license was added by entering the licenseShow command. The licensed features
currently installed on the switch display. If the feature is not listed, enter the licenseAdd command
again.
Some features may require additional configuration, or you may need to disable and reenable the
switch to make them operational; see the feature documentation for details.
High-Performance Extension over FCIP/FC license
Ports on Demand license - additional 16 port upgrade
2 Domain Fabric license
Ports on Demand license - additional 16 port upgrade
Removing a licensed feature
1. Connect to the switch and log in using an admin account.
2. Enter the licenseShow command to display the active licenses.
3. Remove the license key using the licenseRemove command.
switch:admin> licenseremove "key"
The license key is case-sensitive and must be entered exactly as given. The quotation marks
are optional. After removing a license key, the optionally licensed feature is disabled when the switch is
rebooted or when a switch disable and enable is performed.
4. Enter the licenseShow command to verify that the license is disabled.
If there are no license keys, licenseShow displays “No licenses.”
36Standard features
Features and required licenses
Table 4 lists the licenses that should be installed on the local switch and any connecting switches for a
particular feature.
Table 4 License requirements
FeatureLicenseWhere license should be
installed
Administrative
Domains
Configuration
up/download
Diagnostic toolsNo license required.n/a
Distributed
Management Server
EX_PortsIntegrated RoutingLocal and attached switches.
FC FastwriteFC-IP Services or
FCIPFC-IP Services or
FICONNo license required.n/a
FICON-CUPFICON Management ServerLocal switch.
FIPSNo license required.n/a
Firmware downloadNo license required.
No license required.n/a
No license required.
Configupload or configdownload is
a command and comes with the OS on the
switch.
No license required.n/a
High Performance Extension over FCIP/FC
High Performance Extension over FCIP/FC
Firmwaredownload is a command and
comes with the OS on the switch.
n/a
Local and attached switches.
Local and attached switches.
License is needed on both sides
of tunnel.
n/a
Full fabricFull FabricLocal switch. May be required on
attached switches.
Ingress rate limitingAdaptive NetworkingLocal switch and attached
switches.
Integrated routingIntegrated RoutingLocal and attached switches.
Inter-chassis link (ICL)ICLLocal and attached ICLs.
InteroperabilityNo license required.n/a
IPSec for FCIP tunnelsFC-IP Services or
High Performance Extension over FCIP/FC
LDAPNo license required.n/a
Long distanceExtended FabricsLocal and attached switches.
NPIVNo license required.n/a
Per formance
monitoring
Port fencingFabric WatchLocal switch
Basic features - no
Advanced features - yes: Advance
Performance Monitoring.
Local and attached switches.
License is needed on both sides
of tunnel.
License is needed on both sides
of connection.
Local switch
Fabric OS 6.x administrator guide37
Table 4 License requirements
FeatureLicenseWhere license should be
installed
PortsPorts on demand licenses. This license
applies to a select set of switches.
QoSAdaptive NetworkingLocal switch and attached
RADIUSNo license required.n/a
RBACNo license required.n/a
Routing trafficNo license required.
This includes port-based or
exchanged-based routing, static routes,
frame-order deliver, and dynamic routes.
SecurityNo license required.
Includes the DCC, SCC, FCS, IP Filter, and
authentication policies.
SNMPNo license required.n/a
SSH public keyNo license required.n/a
Top TalkersAdvanced Performance MonitoringLocal switch and attached
Traffic IsolationNo license required.n/a
TrunkingISL Trunking or
ISL Trunking Over Extended Fabrics
Local switch
switches.
n/a
n/a
switches.
Local and attached switches.
Two -factor
authentication
Two-to-four domains in
a fabric
USB usageNo license required.n/a
Web ToolsNo license required.Local and any switch you want to
ZoningNo license required.Local and attached switches; or
No license required.n/a
Value Line (Two/Four)Local switch. May be required on
Inter-Chassis Link (ICL) licensing
ICL ports can be used only with an ICL license. After the addition or removal of a license, the license
enforcement is performed on the ICL ports only when the portdisable and portenable commands
are issued on the ports. An ICL license must be installed on both DC Directors forming the ICL connection.
attached switches.
manage using Web Tools.
any switch you want to use in a
zone.
38Standard features
Time-based licenses
A time-based license applies a try-before-you-buy approach to certain features so that you can experience
the feature and its capabilities prior to buying the license. Once you have installed the license, you are
given a time limit to use the feature. The following lists the types of licenses that have this feature:
• FCIP
• Fabric
• Extended Fabric
• Trunking
• Advanced Performance Monitoring
If you downgrade your switch to a version earlier than 6.x, the time-based license will no longer be
available. The license will remain on the switch, but you will not be able to use it.
Once the time-base license is installed you cannot change the time of the switch until the time-based
license is removed. You will need to remove the license, change the date, and then reinstall the license on
the switch.
High Availability considerations
Whenever license database is modified then it is synchronized with the standby CP. When the active CP is
Fabric OS 6.1.0 and has time-based licenses installed, and the standby CP is Fabric OS 6.0.0 or earlier
then, upon HA failover the time-based license would no longer be supported on the director or
enterprise-class platform. You would not have access to the time-based licensed feature until the CPs Fabric
OS 6.1.0 or later. If both CPs have a Fabric OS 6.1.0 or later there will be no change to the time-based
licenses or their associated features.
Firmware upgrade and downgrade consideration
When a time-based license is present on the switch, and you downgrade the firmware to Fabric OS 6.0.0
or earlier, then the firmware downgrade will be blocked.
Configupload and Configdownload considerations
The configdownload and configupload commands will download the legacy, enhanced, consumed
capacities, and time-based licenses.
Expired licenses
Once a license has expired, you will not be able to view it through the licenseShow command. Expired
licenses behave in the same way a license that has been removed from the switch. If your license has
expired, you will need to reboot the switch for the expiry to take affect.
Ports on Demand (POD) licensing
NOTE: See the hardware reference guide for your switch for the specific POD licensing available.
POD licensing is ready to be unlocked in the switch firmware. Its license key may be part of the licensed
paperpack supplied with switch software, or you can purchase the license key separately from HP. You may
need to generate a license key from a transaction key supplied with your purchase, see ”Generating a
license key” on page 35.
Each POD license activates the next group of eight ports in numerical order. For example, the 4/8 SAN
Switch or 4/16 SAN Switch activates the first eight with four port increments. Before installing a license
key, you must insert transceivers in the ports to be activated. Remember to insert the transceivers in the
lowest group of inactive port numbers first.
For example in a SAN Switch 4/32, if only 16 ports are currently active and you are installing one POD
license key, make sure to insert the transceivers in ports 16 through 23. If you later install a second license
key, insert the transceivers in ports 24 through 31. For details on inserting transceivers, see the switch’s
Hardware Reference Manual.
Fabric OS 6.x administrator guide39
After you install a license key, you must enable the ports to complete their activation. You can do so without
disrupting switch operation by issuing the portEnable command on each port. Alternatively, you can
disable and reenable the switch to activate ports.
NOTE: If you enable or disable an active port you will disrupt any traffic and potentially lose data flowing
on that port.
If the port is connected to another switch, you will segment the switch from the fabric and all traffic flowing
between the disabled port and the fabric will be lost.
Activating POD
To activate POD:
1. Connect to the switch and log in on an admin account.
2. Optional: To verify the current states of the ports, use the portShow command.
In the portShow output, the Licensed field indicates whether the port is licensed.
3. Install the Ports on Demand license; see ”Enter the information in the required fields.” on page 35.
4. Use the portEnable command to enable the ports.
5. Optional: Use the portShow command to check the newly activated ports.
If you remove a POD license, the licensed ports will become disabled after the next platform reboot or the
next port deactivation.
Configuring Dynamic Ports on Demand
The Brocade 4Gb SAN Switch for HP c-Class BladeSystem supports blade modules. This switch supports
the Dynamic Ports on Demand (DPOD) feature. The Dynamic POD feature automatically assigns POD
licenses from a pool of available licenses based on the server blade installation.
How ports are assigned to licenses
The Dynamic POD feature detects and assigns ports to a POD license only if the server blade is installed
with an HBA present. A server blade that does not have a functioning HBA is treated as an inactive link
during initial POD port assignment.
The Dynamic POD feature assigns the ports to the POD license as they come online. Typically, assignments
are sequential, starting with the lowest port number. However, variations in the equipment attached to the
ports can cause the ports to take different amounts of time to come online. This means that the port
assignment order is not guaranteed.
If the switch detects more active links than allowed by the current POD licenses, then some ports will not be
assigned a POD license. Ports that do not receive a POD assignment show No Sync or In Sync status;
these ports are not allowed to progress to the online state. Ports that cannot be brought online because of
insufficient POD licenses show a (No POD License) Disabled status. (Use the switchShow
command to display the port states.)
To allocate licenses to a specific port instead of automatically assigning them as the ports come online,
reserve a license for the port using the licensePort command described in ”Managing POD licenses”
on page 42. The port receives a POD assignment if any are available.
After a port is assigned to the POD set, the port is licensed until it is manually removed from the POD port
set using the licensePort
Single, or Double), it creates a vacancy in that port set.
--release command. When a port is released from its POD port set (Base,
40Standard features
Displaying the port license assignment
Use the licensePort --show command to display the available licenses, the current port assignment of
those licenses, and the POD method state (dynamic or static).
To display the port licenses:
1. Connect to the switch and log in using an admin account.
2. Enter the licensePort
switch:admin> licenseport --show
24 ports are available in this switch
Full POD license is installed
Static POD method is in use
24 port assignments are provisioned for use in this switch:
12 port assignments are provisioned by the base switch license
12 port assignments are provisioned by a full POD license
24 ports are assigned to installed licenses:
12 ports are assigned to the base switch license
12 ports are assigned to the full POD license
Ports assigned to the base switch license:
1, 2, 3, 4, 5, 6, 7, 8, 17, 18, 19, 20
Ports assigned to the full POD license:
0, 9, 10, 11, 12, 13, 14, 15, 16, 21, 22, 23
The example above shows output from a switch that manually assigned POD licenses.
--show command.
Activating Dynamic Ports on Demand
If the switch is in the Static POD mode, then activating the Dynamic POD will erase any prior port license
assignments the next time the switch is rebooted. The static POD assignments become the initial Dynamic
POD assignments. After the Dynamic POD feature is enabled, you can customize the POD license
associations.
IMPORTANT: The Dynamic POD feature is supported on the Brocade 4Gb SAN Switch for HP c-Class
BladeSystem only.
To enable Dynamic Ports on Demand:
1. Connect to the switch and log in using an admin account.
2. Enter the licensePort
assignment method to dynamic.
switch:admin> licenseport --method dynamic
The POD method has been changed to dynamic.
Please reboot the switch now for this change to take effect.
3. Enter the reboot command to restart the switch.
switch:admin> reboot
4. Enter the licensePort
switch:admin> licenseport --show
24 ports are available in this switch
Full POD license is installed
Dynamic POD method is in use
24 port assignments are provisioned for use in this switch:
12 port assignments are provisioned by the base switch license
12 port assignments are provisioned by a full POD license
8 ports are assigned to installed licenses:
8 ports are assigned to the base switch license
0 ports are assigned to the full POD license
Ports assigned to the base switch license:
--method command with the dynamic option to change the license
--show command to verify that the switch started the Dynamic POD feature.
Fabric OS 6.x administrator guide41
1, 2, 5, 6, 8*, 21, 22, 23
Ports assigned to the full POD license:
None
Ports not assigned to a license:
0, 3, 4, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20
16 license reservations are still available for use by unassigned ports
1 license assignment is held by an offline port (indicated by *)
Disabling Dynamic Ports on Demand
Disabling the Dynamic POD feature (changing the POD method to static), erases any prior port license
associations or assignments the next time the switch is rebooted.
To disable Dynamic Ports on Demand:
1. Connect to the switch and log in using an admin account.
2. Enter the licensePort
assignment method to static.
switch:admin> licenseport --method static
The POD method has been changed to static.
Please reboot the switch now for this change to take effect.
3. Enter the reboot command to restart the switch.
switch:admin> reboot
4. Enter the licensePort --show command to verify the switch started the Static POD feature.
switch:admin> licenseport --show
24 ports are available in this switch
Full POD license is installed
Static POD method is in use
24 port assignments are provisioned for use in this switch:
12 port assignments are provisioned by the base switch license
12 port assignments are provisioned by a full POD license
24 ports are assigned to installed licenses:
12 ports are assigned to the base switch license
12 ports are assigned to the full POD license
Ports assigned to the base switch license:
1, 2, 3, 4, 5, 6, 7, 8, 17, 18, 19, 20
Ports assigned to the full POD license:
0, 9, 10, 11, 12, 13, 14, 15, 16, 21, 22, 23
--method command with the static option to change the license
Managing POD licenses
This section explains how to allocate licenses by reserving and releasing POD assignments to specific
ports. Disabled ports are not candidates for automatic license assignment by the Dynamic POD feature.
Persistently disable an otherwise viable port to prevent it from coming online, and thereby preserve a
license assignment for another port.
Before you can re-assign a license, you must disable the port and release the license.
Reserving a license
Reserving a license for a port assigns a POD license to that port whether the port is online or offline. That
license will not be available to other ports that come online before the specified port.
To reserve a port license:
1. Connect to the switch and log in using an admin account.
2. Enter the licensePort
switch:admin> licenseport --show
24 ports are available in this switch
Full POD license is installed
Dynamic POD method is in use
24 port assignments are provisioned for use in this switch:
12 port assignments are provisioned by the base switch license
42Standard features
--show command to verify that there are port reservations still available.
12 port assignments are provisioned by a full POD license
10 ports are assigned to installed licenses:
10 ports are assigned to the base switch license
0 ports are assigned to the full POD license
Ports assigned to the base switch license:
1*, 2*, 3*, 4*, 5*, 6*, 8*, 21, 22, 23
Ports assigned to the full POD license:
None
Ports not assigned to a license:
0, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20
3. If a port reservation is available, then issue the licensePort --reserve command to reserve a
license for the port.
switch:admin> licenseport -reserve 0
4. If all port reservations are assigned, select a port to release its POD license. You must disable the port
first by entering the command portdisable <port num>.
5. Enter the licensePort
switch:admin> licenseport --release 0
--release command to remove the port from the POD license.
6. Enter the licensePort --showcommand to verify there is an available port reservation.
switch:admin> licenseport --show
24 ports are available in this switch
Full POD license is installed
Dynamic POD method is in use
24 port assignments are provisioned for use in this switch:
12 port assignments are provisioned by the base switch license
12 port assignments are provisioned by a full POD license
10 ports are assigned to installed licenses:
10 ports are assigned to the base switch license
0 ports are assigned to the full POD license
Ports assigned to the base switch license:
1*, 2*, 3*, 4*, 5*, 6*, 8*, 21, 22, 23
Ports assigned to the full POD license:
None
Ports not assigned to a license:
0, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20
7. Enter the switchEnable command to bring the switch back online.
switch:admin> switchenable
Releasing a port
Releasing a port removes it from the POD set; the port will appear as unassigned until it comes back
online. Persistently disabling the port will ensure that the port cannot come back online and be
automatically assigned to a POD assignment.
To release a port from a POD set:
1. Connect to the switch and log in using an admin account.
2. Enter the switchDisable command to take the switch offline.
switch:admin> switchdisable
3. Enter the switchShow command to verify the switch state is offline.
4. Enter the licensePort
switch:admin> licenseport --release 0
5. Enter the licensePort --show command to verify the port is no longer assigned to a POD set.
switch:admin> licenseport --show
24 ports are available in this switch
Full POD license is installed
Dynamic POD method is in use
24 port assignments are provisioned for use in this switch:
12 port assignments are provisioned by the base switch license
12 port assignments are provisioned by a full POD license
10 ports are assigned to installed licenses:
10 ports are assigned to the base switch license
0 ports are assigned to the full POD license
--release command to remove the port from the POD license.
Fabric OS 6.x administrator guide43
Ports assigned to the base switch license:
1*, 2*, 3*, 4*, 5*, 6*, 8*, 21, 22, 23
Ports assigned to the full POD license:
None
Ports not assigned to a license:
0, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20
switch:admin>
6. Enter the switchEnable command to bring the switch back online.
7. Enter the switchShow command to verify the switch state is now online.
Disabling and enabling switches
By default, the switch is enabled after power is applied and diagnostics and switch initialization routines
have finished. You can disable and reenable it as necessary.
To disable a switch:
1. Connect to the switch and log in using an admin account.
2. Enter the switchDisable command.
All Fibre Channel ports on the switch are taken offline. If the switch was part of a fabric, the fabric is
reconfigured.
To enable a switch:
1. Connect to the switch and log in using an admin account.
2. Enter the switchEnable command.
All Fibre Channel ports that passed the POST test are enabled. If the switch has interswitch links (ISLs) to
a fabric, it joins the fabric.
Disabling and enabling ports
By default, all licensed ports are enabled. You can disable and reenable them as necessary. Ports that you
activate with Ports on Demand must be enabled explicitly, as described in ”Activating ports on demand”
on page 37.
WARNING!The fabric will be reconfigured if the port you are enabling or disabling is connected to
another switch.
The switch whose port has been disabled will be segmented from the fabric and all traffic flowing between
it and the fabric will be lost.
To disable a port:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the following command:
switch:admin> portdisable portnumber
where portnumber is the port number of the port you want to disable.
For 4/256 SAN Director and DC SAN Backbone Director (short name, DC Director): Enter
the following command:
switch:admin> portdisable slotnumber/portnumber
where slotnumber and portnumber are the slot and port numbers of the port you want to disable.
To enable a port:
1. Connect to the switch and log in using an admin account.
2. Enter the following command:
switch:admin> portenable portnumber
where portnumber is the port number of the port you want to enable.
44Standard features
For 4/256 SAN Director and DC Director: Enter the following command:
switch:admin> portenable slotnumber/portnumber
where slotnumber and portnumber are the slot and port numbers of the port you want to enable.
(Slots are numbered 1 through 4 and 7 through 10, counting from left to right.)
If the port is connected to another switch, the fabric may be reconfigured. If the port is connected to one or
more devices, these devices become available to the fabric.
If you change port configurations during a switch failover, the ports may become disabled. To bring the
ports online, re-issue the portEnable command after the failover is complete.
Making basic connections
You can make basic connections to devices and to other switches.
Before connecting a switch to a fabric that contains switches running different firmware versions, you must
first set the same PID format on all switches. The presence of different PID formats in a fabric causes fabric
segmentation.
• For information on PID formats and related procedures, see ”Selecting a PID format” on page 465.
• For information on configuring the routing of connections, see ”Routing traffic” on page 205.
3. For information on configuring extended interswitch connections, see ”Administering Extended Fabrics”
on page 361.
Connecting to devices
To minimize port logins, power off all devices before connecting them to the switch. For devices that cannot
be powered off, first use the portDisable command to disable the port on the switch, and then connect
the device. When powering the devices back on, wait for each device to complete the fabric login before
powering on the next one.
Connecting to other switches
See the hardware reference guide for your specific switch for interswitch link (ISL) connection and cable
management information. The standard or default ISL mode is L0. ISL Mode L0 is a static mode, with the
following maximum ISL distances:
• 10 km at 1 Gbps
• 5 km at 2 Gbps
• 2.5 km at 4 Gbps
• 1. 25 k m a t 8 G b ps
ISL mode L0 is available on all Fabric OS releases. When you upgrade from Fabric OS 5.3.0 to Fabric 6.x
or later, all extended ISL ports are set automatically to L0 mode.
For information on extended ISL modes, which enable longer distance interswitch links, see ”Administering
Extended Fabrics” on page 361.
Linking through a gateway
A gateway merges SANs into a single fabric by establishing point-to-point E_Port connectivity between two
Fibre Channel switches that are separated by a network with a protocol such as IP or SONET.
Except for link initialization, gateways are transparent to switches; the gateway simply provides E_Port
connectivity from one switch to another.
By default, switch ports initialize links using the Exchange Link Parameters (ELP) mode 1. However,
gateways expect initialization with ELP mode 2, also referred to as ISL R_RDY mode. Therefore, to enable
two switches to link through a gateway, the ports on both switches must be set for ELP mode 2.
Fabric OS 6.x administrator guide45
Any number of E_Ports in a fabric can be configured for gateway links, provided the following rules
are followed:
• All switches in the fabric must be upgraded to Fabric OS 5.2.0 or later.
• All switches in the fabric are using the core PID format.
• The switches connected to both sides of the gateway are included when determining switch count
maximums.
• Extended links (those created using the Extended Fabrics licensed feature) and the security features if
you are running a Fabric OS version earlier than 6.x in Secure Fabric OS are not supported through
gateway links.
To configure a link through a gateway:
1. If you are not sure if the PID format is consistent across the entire fabric, enter the configShow
command on all switches to check the PID setting. If necessary, change the PID format on any
nonconforming switches, as described in ”Configuring the PID format” on page 463.
2. Connect to the switch on one end of the gateway and log in using an admin account.
3. Enter the portCfgIslMode command that is appropriate for your hardware model:
4/8 SAN Switch and 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32,
Brocade 4Gb SAN Switch for HP p-Class BladeSystem, Brocade 4Gb SAN Switch for HP c-Class
BladeSystem, SAN Switch 4/32, 4/64 SAN Switch, SAN Switch 4/32B, and 400 Multi-protocol
Router:
portCfgIslMode <port,mode>
Specify a port number. Valid values for port number vary depending on the switch type. The mode
operand is required: specify 1 to enable ISL R_RDY mode (gateway link) or specify 0 to disable it.
4/256 SAN Director and DC SAN Backbone Director (short name, DC Director):
portCfgIslMode <slot/port, mode>
Specify a slot/port number pair. Valid values for slot and port number vary depending on the switch
type. The mode operand is required: specify 1 to enable ISL R_RDY mode (gateway link) or specify 0 to
disable it.
In the following example, slot 2, port 3 is enabled for a gateway link:
switch:admin> portcfgislmode 2/3, 1
Committing configuration...done.
ISL R_RDY Mode is enabled for port 3. Please make sure the PID
formats are consistent across the entire fabric.
switch:admin>
4. Repeat the steps for any additional ports that will be connected to the gateway.
5. Repeat the procedure on the switch at the other end of the gateway.
Checking status
You can check the status of switch operation, High Availability features, and fabric connectivity.
To check switch operation:
1. Connect to the switch and log in using an admin account.
2. Enter the switchShow command. This command displays a switch summary and a port summary.
3. Check that the switch and ports are online.
4. Use the switchStatusShow command to further check the status of the switch.
High Availability (HA) features provide maximum reliability and nondisruptive replacement of key
hardware and software modules.
To verify HA features (Directors only):
1. Connect to the switch using an account with admin role
2. Enter the chassisShow command to verify the field replaceable units (FRUs).
46Standard features
3. Enter the haShow to verify that HA is enabled, the heartbeat is up, and that the HA state is
synchronized between the active and standby CP blades.
4. Enter the slotShow to display the inventory and the current status of each slot in the system.
To verify fabric connectivity:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the fabricShow command. This command displays a summary of all the switches in the fabric.
switch:admin> fabricshow
Switch ID Worldwide Name Enet IP Addr FC IP Addr Name
The number of devices listed should reflect the number of devices that are connected.
To show switches in Access Gateway mode:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the agShow command.
switch:admin> agshow
Worldwide Name Ports Enet IP Addr Firmware Local/Remote Name
-------------------------------------------------------------10:00:00:05:1e:02:1d:b0 16 10.32.53.4 v5.2.1 local ag_01
10:00:00:05:1e:03:4b:e7 24 10.32.60.95 v5.2.1 local ag_02
10:00:00:05:1e:35:a2:58 20 10.32.53.180 v5.2.1 remote ag_03
This command displays all the switches in Access Gateway mode in the fabric.
Fabric OS 6.x administrator guide47
Tracking and controlling switch changes
The track changes feature allows you to keep a record of specific changes that may not be considered
switch events, but may provide useful information. The output from the track changes feature is dumped to
the system messages log for the switch. Use the errDump or errShow command to view the log.
Items in the log created from the Track changes feature are labeled TRCK.
Trackable changes are:
• Successful login
• Unsuccessful login
• Logout
• Configuration file change from task
• Track changes on
• Track changes off
An SNMP-TRAP mode can also be enabled (see the trackChangesHelp command in the Fabric OS
Command Reference).
For troubleshooting information on the track changes feature, see ”Inaccurate information in the system
message log” on page 320.
To enable the track changes feature:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter this command to enable the track changes feature: trackChangesSet 1.
A message displays, verifying that the track changes feature is on:
3. Use the errDump or errShow command to view the log.
2004/08/24-08:45:43, [TRCK-1001], 212,, INFO, ras007, Successful login by user admin.
To display the status of the track changes feature:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the trackChangesShow command.
The status of the track changes feature is displayed as either on or off. The display includes whether or
not the track changes feature is configured to send SNMP traps.
switch:admin> trackchangesshow
Track changes status: ON
Track changes generate SNMP-TRAP: NO
switch:admin>
48Standard features
To view the switch status policy threshold values:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the switchStatusPolicyShow command.
Whenever there is a switch change, an error message is logged and an SNMP
connUnitStatusChange trap is sent.
The output is similar to the following:
switch:admin> switchstatuspolicyshow
The current overall switch status policy parameters:
Down Marginal
The policy parameter determines the number of failed or inoperable units for each contributor that will
trigger a status change in the switch.
Each parameter can be adjusted so that a specific threshold must be reached before that parameter
changes the overall status of a switch to MARGINAL or DOWN. For example, if the FaultyPorts DOWN
parameter is set to 3, the status of the switch will change if 3 ports fail. Only one policy parameter needs
to pass the MARGINAL or DOWN threshold to change the overall status of the switch.
For more information about setting policy parameters, see the Fabric Watch Administrator’s Guide.
To set the switch status policy threshold values:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the switchStatusPolicySet command.
The current switch status policy parameter values are displayed. You are prompted to enter values for
each DOWN and MARGINAL threshold parameter.
By setting the DOWN and MARGINAL values for a parameter to 0,0 that parameter is no longer used
in setting the overall status for the switch.
Fabric OS 6.x administrator guide49
3. Verify the threshold settings you have configured for each parameter.
Enter the switchStatusPolicyShow command to view your current switch status policy
configuration.
HP StorageWorks 4/8 SAN Switch and 4/16 SAN Switch, Brocade 4Gb SAN Switch
for HP p-Class BladeSystem, Brocade 4Gb SAN Switch for HP c-Class BladeSystem,
SAN Switch 4/32, 4/64 SAN Switch, SAN Switch 4/32B, 400 Multi-protocol Router:
switch:admin> switchstatuspolicyset
To change the overall switch status policy parameters
The current overall switch status policy parameters:
Down Marginal
Note that the value, 0, for a parameter, means that it is
NOT used in the calculation.
** In addition, if the range of settable values in the prompt is (0..0),
** the policy parameter is NOT applicable to the switch.
** Simply hit the Return key.
Bad PowerSupplies contributing to DOWN status: (0..2) [2] 0
Bad PowerSupplies contributing to MARGINAL status: (0..2) [1] 0
Bad Temperatures contributing to DOWN status: (0..6) [2] 0
Bad Temperatures contributing to MARGINAL status: (0..6) [1] 0
Bad Fans contributing to DOWN status: (0..3) [2] 0
Bad Fans contributing to MARGINAL status: (0..3) [1] 0
Out of range Flash contributing to DOWN status: (0..1) [0] 0
Out of range Flash contributing to MARGINAL status: (0..1) [1] 0
MarginalPorts contributing to DOWN status: (0..32) [2] 0
MarginalPorts contributing to MARGINAL status: (0..32) [1] 0
FaultyPorts contributing to DOWN status: (0..32) [2] 0
FaultyPorts contributing to MARGINAL status: (0..32) [1] 0
MissingSFPs contributing to DOWN status: (0..32) [0] 0
MissingSFPs contributing to MARGINAL status: (0..32) [0] 0
Policy parameter set has been changed
rint12:admin>
4/256 SAN Director and DC SAN Backbone Director (short name, DC Director): Command
output includes parameters related to CP blades.
Configuring the audit log
When managing SANs, you may want to filter, or audit certain classes of events to ensure that you can
view and generate an audit log for what is happening on a switch, particularly for security-related event
changes if you are running a Fabric OS version earlier than 6.x. These events include login failures, zone
configuration changes, firmware downloads, and other configuration changes—in other words—critical
changes that have a serious effect on the operation and security of the switch.
Important information related to event classes is also tracked and made available. For example, you can
track changes from an external source by the user name, IP address, or type of management interface used
to access the switch.
Auditable events are generated by the switch and streamed to an external host through a configured
system message log daemon (syslog). You specify a filter on the output to select the event classes that are
sent through the system message log. The filtered events are streamed chronologically and sent to the
system message log on an external host in the specified audit message format. This ensures that they can
50Standard features
be easily distinguished from other system message log events that occur in the network. Then, at some
regular interval of your choosing, you can review the audit events to look for unexpected changes.
Before you configure audit event logging, familiarize yourself with the following audit event log behaviors
and limitations:
• By default, all event classes are configured for audit; to create an audit event log for specific events, you
must explicitly set a filter with the class operand and then enable it.
• Audited events are generated specific to a switch and have no negative impact on performance.
• If you are running Fabric OS versions earlier than 6.x, all Secure Fabric OS events are audited.
• Events are not persistently stored on the switch but are streamed to a system message log.
• The audit log depends on the system message log facility and IP network to send messages from the
switch to a remote host. Because the audit event log configuration has no control over these facilities,
audit events can be lost if the system message log and IP network facilities fail.
• If too many events are generated by the switch, the system message log will become a bottleneck and
audit events will be dropped by the Fabric OS.
• If the user name, IP address, or user interface is not transported, an audit message is logged by adding
the message None to each of the respective fields.
• For High Availability, the audit event logs exist independently on both active and standby CPs. The
configuration changes that occur on the active CP are propagated to the standby CP and take effect.
• Audit log configuration is updated through a configuration download.
See the Fabric OS Command Reference for more information about the auditCfg command and
command syntax.
Auditable event classes
You configure the audit log using the auditCfg command. Before configuring an audit log, you must
select the event classes you want audited. When enabled, the audit log feature audits any RASLog
messages (system message log) previously tagged as AUDIT in Fabric OS 6.x. The audit log includes:
• SEC-3001 through SEC-3017
• SEC-3024 through SEC-3029
• ZONE-3001 through ZONE-3012
Table 5 identifies auditable event classes and auditCfg operands used to enable auditing of a specific
class.
Table 5 AuditCfg event class operands
OperandEvent classDescription
1ZoneAudit zone event configuration changes, but not the actual values that
2SecurityAudit any user-initiated security events for all management interfaces. For
3ConfigurationAudit configuration downloads of existing SNMP configuration
were changed. For example, a message may state, “Zone configuration
has changed,” but the syslog does not display the actual values that were
changed.
events that have an impact on an entire fabric, an audit is generated
only for the switch from which the event was initiated.
parameters. Configuration uploads are not audited.
4FirmwareAudit firmware download start, firmware complete, and any other errors
Switch names are logged for switch components and Director names for Director components. For
example, a Director name may be FWDL or RAS and a switch component name may be zone, name
server, or SNMP.
Pushed messages contain the administration domain of the entity that generated the event. See the Fabric OS Message Reference for details on message formats. See ”Working with Diagnostic Features” on
page 285 for details on setting up the system error log daemon.
Audit logging assumes that your syslog is operational and running. Before configuring an audit log, you
must perform the following steps to ensure that the host syslog is operational.
To verify host syslog prior to configuring the audit log:
1. Set up an external host machine with a system message log daemon running to receive the audit events
that will be generated.
2. On the switch where the audit configuration is enabled, enter the syslogdipaddrAdd command to
add the IP address of the host machine so that it can receive the audit events.
You can use IPv4, IPv6, or DNS names for the syslogdipaddrAdd command.
3. Ensure the network is configured with a network connection between the switch and the remote host.
4. Check the host SYSLOG configuration. If all error levels are not configured, you may not see some of
the audit messages.
To configure an audit log for specific event classes:
1. Connect to the switch from which you wish to generate an audit log and log in using an account
assigned to the admin role.
2. Enter the auditCfg
switch:admin> auditcfg --class 2,4
Audit filter is configured.
--class command, which defines the specific event classes to be filtered.
The auditCfg event class operands are identified in Table 5.
3. Enter the auditCfg
--enable command, which enables audit event logging based on the classes
configured in step 2.
switch:admin> auditcfg --enable
Audit filter is enabled.
To disable an audit event configuration, enter the auditCfg --disable command.
4. Enter the auditCfg
--show command to view the filter configuration and confirm that the correct
event classes are being audited, and the correct filter state appears (enabled or disabled).
switch:admin> auditcfg --show
Audit filter is enabled.
2-SECURITY
4-FIRMWARE
5. To verify the audit event log setup, make a change affecting an enabled event class, and confirm that
the remote host machine receives the audit event messages.
The following example shows the SYSLOG (system message log) output for audit logging.
Jun 5 08:15:32 [10.32.248.73.2.2] raslogd: AUDIT, 2006/06/05-13:38:17, [SEC-1000],
WARNING, SECURITY, JaneDoe/root/192.168.132.19/
telnet, Domain A/DoeSwitch, , Incorrect password during login attempt.
Shutting down switches and Directors
To avoid corrupting your file system, HP recommends that you perform graceful shutdowns of switches and
Directors. The following procedure describes how to gracefully shut down a switch.
To power off a switch:
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the sysShutdown command.
3. At the prompt, enter y.
switch:admin> sysshutdown
This command will shutdown the operating systems on your switch.
You are required to power-cycle the switch in order to restore operation.
Are you sure you want to shutdown the switch [y/n]?y
4. Wait until the following message displays:
Broadcast message from root (ttyS0) Wed Jan 25 16:12:09 2006...
The system is going down for system halt NOW !!
INIT: Switching to runlevel: 0
INIT: Sending processes the TERM signal
Unmounting all filesystems.
The system is halted
flushing ide devices: hda
Power down.
5. Power off the switch.
To power off a Director:
1. From the active CP in a dual CP platform, enter the sysShutdown command.
When the sysShutdown command is issued on the active CP, the active CP, the standby CP, and any
AP blades are all shut down.
2. At the prompt, enter y.
3. Wait until you see the following message:
2006/01/25-17:01:40, [FSSM-1003], 194,, WARNING, NANDU, HA State out of sync
HA is disabled
Broadcast message from root (ttyS0) Wed Jan 25 17:01:41 2006...
The system is going down for system halt NOW !!
INIT: Switching to runlevel: 0
INIT: Sending processes the TERM signal
Unmounting all filesystems.
The system is halted
flushing ide devices: hda
Power down.
4. Power off the switch.
High Availability of daemon processes
Fabric OS 6.x supports automatic restart of non-critical daemons. Starting these non-critical daemons is
automatic, you cannot configure the startup process. The following sequence of events occurs when a
non-critical daemon fails:
1. When a non-critical daemon fails or dies, a RASLog and AUDIT event message is logged.
2. The daemon is automatically started again.
3. If the restart is successful, then another message is sent to RASLog and AUDIT reporting the successful
restart status.
4. If the restart fails, another message is sent to RASLog and no further attempts are made to restart the
daemon.
Fabric OS 6.x administrator guide53
Schedule downtime and reboot the switch at your convenience. Table 6 lists the daemons that are
considered non-critical and are automatically restarted on failure.
Table 6 Daemons that are automatically restarted
DaemonDescription
ArrdAsynchronous Response Router (used to send management data to hosts when the switch is accessed
through the APIs (FA API or SMI-S).
CaldCommon Access Layer Daemon (used by Manageability Applications).
EvmdEvent Monitor Daemon (used by port and switch SCNs, firmwareDownload, and configDownload)
RaslogdRemote Access Service Log Daemon logs error detection, reporting, handling, and presentation of
data into a format readable by management tools and the user.
RpcdRemote Procedure Call daemon used by the API (Fabric Access API and SMI-S).
SnmpdSimple Network Management Protocol Daemon.
TracedTrace Daemon. Provides trace entry date/time translation to Trace Device at startup and when
date/time changed by command. Maintains the trace dump trigger parameters in a Trace Device.
Performs the trace Background Dump, trace automatic FTP, and FTP “aliveness check” if auto-FTP is
enabled.
TrackdTrack Changes Daemon.
WebdWebserver daemon used for Web Tools (includes httpd as well).
54Standard features
2Managing user accounts
This chapter provides information and procedures on managing authentication and user accounts for the
switch management channel.
Overview
In addition to the default accounts—root, factory, admin, and user—Fabric OS supports up to 252
additional user-defined accounts in each logical switch (domain). These accounts expand your ability to
track account access and audit administrative activities.
Each user-defined account is associated with the following:
• Admin Domain list—Specifies what Admin Domains a user account is allowed to log in to.
• Home Admin Domain—Specifies the Admin Domain that the user is logged in to by default. The home
Admin Domain must be a member of the user’s Admin Domain list.
• Role—Determines functional access levels within the bounds of the user’s current Admin Domain.
Fabric OS provides three options for authenticating users—remote RADIUS services, remote LDAP service,
and the local switch user database. All options allow users to be centrally managed using the following
methods:
• Remote RADIUS servers—Users are managed in a remote RADIUS server. All switches in the fabric
can be configured to authenticate against the centralized remote database.
• Remote LDAP servers—Users are managed in a remote LDAP server. All switches in the fabric can
be configured to authenticate against the centralized remote database.
• Local user database—Users are managed using the local user database. The local user database
is manually synchronized using the distribute command to push a copy of the switch’s local user
database to all other Fabric OS 5.3.0 and later switches in the fabric.
Accessing the management channel
Table 7 shows the number of simultaneous login sessions allowed for each role. The roles are displayed in
alphabetic order which does not reflect their importance.
Table 7 Maximum number of simultaneous sessions
Role nameMaximum sessions
Admin2
BasicSwitchAdmin4
FabricAdmin4
Operator4
SecurityAdmin4
SwitchAdmin4
User4
ZoneAdmin4
Fabric OS 6.x administrator guide53
Using Role-Based Access Control (RBAC)
Role-Based Action Control (RBAC) defines the capabilities that a user account has based on the role the
account has been assigned. For each role, there is a set of pre-defined permissions on the jobs and tasks
that can be performed on a fabric and its associated fabric elements. Fabric OS 6.x uses RBAC to
determine which commands a user can issue.
When you log in to a switch, your user account is associated with a pre-defined role. The role that your
account is associated with determines the level of access you have on that switch and in the fabric. Table 8
outlines the Fabric OS predefined roles.
UserAllMonitoring onlyNonadministrative use, such as
ZoneAdmin5.2.0 and laterZone administrationZone management commands only.
Mostly monitoring with limited
switch (local) commands.
All switch and fabric commands,
excludes user management and
Administrative Domains commands.
Routine switch maintenance
commands.
All switch security and user
management functions.
Most switch (local) commands,
excludes security, user management,
and zoning commands.
monitoring system activity.
You can perform these operations only on the primary FCS switch.
For legacy users with no Admin Domain specified, the user will have access to AD 0 through 255 (physical
fabric admin) if their current role is Admin; otherwise, the user will have access to AD0 only.
If some Admin Domains have been defined for the user and all of them are inactive, the user will not be
allowed to log in to any switch in the fabric.
If no Home Domain is specified for a user, the system provides a default home domain. The default home
domain for the predefined account is AD0. For user-defined accounts, the default home domain is the
Admin Domain in the user’s Admin Domain list with the lowest ID.
54Managing user accounts
Role permissions
Table 9 describes the types of permissions that are assigned to roles.
Table 9 Permission types
AbbreviationDefinitionDescription
OObserveThe user can run commands using options that display information only,
MModifyThe user can run commands using options that create, change, and
such as running userConfig --show -a to show all users on a
switch.
delete objects on the system, such as running userconfig
--changeusername-rrolename to change a user’s role.
OMObserve and
modify
NNoneThe user is not allowed to run commands in a given category.
The user can run commands using both observe and modify options; if
a role has modify permissions, it almost always has observe.
Table 10 shows the permission type for categories of commands that each role is assigned. The
permissions apply to all commands within the specified category. For a complete list of commands and
role permissions, see the Fabric OS Command Reference.
Table 10 RBAC permissions matrix
CategoryRole permission
UserOperatorSwitch
admin
Zone
admin
Fabric
admin
Basic
switch
AdminSecurity
admin
Admin DomainsNNNNNNOMO
Admin Domains—SelectionOMOMOMOMOMOMOMOM
Access GatewayOOMOMOOMOOMN
APMOOOMNOMOOMN
AuditOOOOOOOMOM
AuthenticationNNNNNNOMOM
BladeOOMOMNOMOOMN
admin
Chassis ConfigurationOOMOMNOMOOMN
Configuration ManagementNOOOOOOMO
Data Migration ManagerNNNNNNOMN
DebugNNNNNNNN
DiagnosticsOOMOMNOMOOMN
Ethernet ConfigurationOOOMNOMOOMN
FabricOOOOOMOOMO
Fabric DistributionNNNNOMNOMOM
Fabric RoutingOOOOOMOOMN
Fabric WatchOOMOMNOMOOMN
FICONOOMOMNOMOOMN
Firmware ManagementOOMOMOOMOOMO
FRU ManagementOOMOMNOMOOMN
Fabric OS 6.x administrator guide55
Table 10 RBAC permissions matrix (continued)
CategoryRole permission
UserOperatorSwitch
admin
Zone
admin
Fabric
admin
Basic
switch
AdminSecurity
admin
admin
HA (High Availability)OOOMNOMOOMO
iSCSIOOOOOMOOMN
LicenseOOMOMOOMOOMO
LDAPNNNNNNOMOM
Local User EnvironmentOMOMOMOMOMOMOMOM
LoggingOOMOMOOMOOMOM
Management Access
Configuration
Management ServerOOMOMOOMOOMN
Name ServerOOOMOOMOOMN
Nx_Port ManagementOMOMNOMOOMN
Physical Computer SystemOOOOOOOO
PKIOOONOOOMOM
Por t MirroringNNNNNNOMN
QOSOOMOMOOMOMOMO
OOMOMNOMOOMN
RADIUS NNNNNNOMOM
Routing—AdvancedOOONOMOOMN
Routing—Basic OOMOMOOMOOMN
SecurityONONOMOOMOM
Session ManagementOOMOMNOMOMOMOM
SNMPOOOMNOMOOMOM
StatisticsOOMOMNOMOOMN
Statistics—DeviceOOMOMNOMOOMN
Statistics—PortOOMOMNOMOOMN
Switch ConfigurationOOMOMNOMOOMOM
Switch ManagementOOMOMOOMOOMO
Switch Management—IP
Configuration
Switch Port ConfigurationOOMOMNOMOMOMN
Switch Port ManagementOOMOMOOMOMOMO
TopologyOOONOMOOMN
User ManagementNNNNNNOMOM
OOMOMNOMOOMOM
WWN CardOOMOMNOMNOMN
ZoningOOOOMOMOOMO
Set the authentication model on each switch. Refer to ”Authentication model” on page 65 for more
information.
56Managing user accounts
Managing the local database user accounts
User add, change, and delete operations are subject to the subset rule: an admin with ADlist 0-10 cannot
perform operations on an admin, user, or any role with an ADlist 11-25. The user account being changed
must have an ADlist that is a subset of the account that is making the change.
About the default accounts
Fabric OS provides the following predefined accounts in the local switch user database. The password for
all default accounts should be changed during the initial installation and configuration for each switch.
Table 11 lists default local user accounts.
Table 11Default local user accounts
Account
RoleAdmin
name
adminAdminAD0-255
factoryFactoryAD0-255
rootRootAD0-255
userUserAD0
Defining local user accounts
In addition to the default administrative and user accounts, Fabric OS supports up to 252 user-defined
accounts in each logical switch (domain). These accounts expand your ability to track account access and
audit administrative activities.
The following procedures can be performed on local user accounts. Administrators can act on other
accounts only if that account has an Admin Domain list that is a subset of the administrator.
To display account information:
1. Connect to the switch and log in using an admin account.
2. Enter the appropriate show operands for the account information you want to display:
• userConfig
• userConfig
• userConfig
• userConfig
specified admindomain_ID
--show -a to show all account information for a logical switch
--show -b to show all backup account information for a logical switch
--show username to show account information for the specified account
--showad -a admindomain_ID to show all accounts permitted to select the
Description
domain
Most commands have observe-modify permission.
home: 0
Reserved.
home: 0
Reserved.
home: 0
Most commands have observe-only permission.
home: 0
Fabric OS 6.x administrator guide57
To create an account:
1. Connect to the switch and log in using an admin account.
usernameSpecifies the account name, which must begin with an alphabetic
character. The name can be from 8 to 40 characters long. It is
case-sensitive and can contain alphabetic and numeric
characters, the period (.) and the underscore ( _ ). It must be
different than all other account names on the logical switch. The
account name cannot be the same as a role name.
-r rolenameSpecifies the role: User, SwitchAdmin, ZoneAdmin, FabricAdmin,
BasicSwitchAdmin, Operator, or Admin in nonsecure mode; in
secure mode you can also use NonfcsAdmin.
-h admindomain_IDOptional: Specifies the home Administrative Domain; if no
Administrative Domain is specified, then the lowest numbered
Administrative Domain in the list is assigned.
-a admindomain_ID_list Optional: Specifies which Administrative Domains the user may
access; if no Administrative Domains are listed, the user is
automatically assigned to AD0. Use comma-separated lists,
ranges, or both for example -a 0,9,10-15,244.
-d descriptionOptional: Adds a description to the account. The description field
can be up to 40 printable ASCII characters long. The following
characters are not allowed: asterisk (*), single quotation mark (‘),
quotation mark (“), exclamation point (!), semicolon (;), and
colon (:).
-x Specifies an expired password that must be changed the first time
the user logs in.
3. In response to the prompt, enter a password for the account.
The password is not displayed when you enter it on the command line.
To delete an account:
1. Connect to the switch and log in using an admin account.
2. Enter the following command:
userConfig --delete username
where username specifies the account name
You cannot delete the default accounts. An account cannot delete itself. All active CLI sessions for the
deleted account are logged out.
3. At the prompt for confirmation, enter y.
58Managing user accounts
To change account parameters:
When changing account parameters, if you change the ADlist for the user account, all of the currently
active sessions for that account will be logged out.
1. Connect to the switch and log in using an admin account.
usernameSpecifies the account for which parameters are being changed.
-r rolenameChanges the role to one of the names listed in Table 8 on
page 54. In secure mode, role can also be changed to
nonfcsadmin role. An account cannot change its own role.
Account with Admin role can change the role names of all
user-defined accounts except those with Admin roles.
-h admindomain_IDOptional: Changes the home Administrative Domain; if no
Administrative Domain is specified, then the lowest numbered
Administrative Domain in the list is assigned.
-a
admindomain_ID_lis
t
Optional: Changes which Administrative Domains the user may
access; if no Administrative Domains are listed, the user is
automatically assigned to AD0. Use comma-separated lists,
ranges, or both for example -a 0,9,10-15,244.
-d descriptionOptional: Changes the description to the account. The
description field can be up to 40 printable ASCII characters
long. The following characters are not allowed: asterisk (*),
single quotation mark (‘), quotation mark (“), exclamation point
(!), semicolon (;), and colon (:).
-eOptional: Enables or disables the account. Enter yes to enable
the account or no to disable it. If you disable an account, all
active CLI sessions for that account are logged out. You can
enable or disable user-defined or default accounts.
-uUnlocks the user account.
-xSpecifies an expired password that must be changed the first
time the user logs in.
To add an Administrative Domain to the account:
1. Connect to the switch and log in using an admin account.
where <username> is the account to which the Administrative Domain is being added (the account
must already exist) <admindomain_ID> is the home Administrative Domain and
<admindomain_ID_list> adds the new list Administrative Domain to the existing list.
3. Log into the switch again to verify access to the newly-added Admin Domain.
To remove an Administrative Domain from the account:
When removing an Admin Domain from an account, all of the currently active sessions for that account will
be logged out.
1. Connect to the switch and log in using an admin account.
where <username> is the account from which the Admin Domain is being removed (the account must
already exist) admindomain_ID is the home Admin Domain, and admindomain_ID_list is the Admin
Domain list to be removed from the existing list. If the –h argument is not specified, the home Admin
Domain will either remain as it was or will be the lowest Admin Domain ID in the remaining list.
Fabric OS 6.x administrator guide59
Recovering accounts
The following conditions apply to recovering user accounts:
• The attributes in the backup database replace the attributes in the current account database.
• An event is stored in the system message log, indicating that accounts have been recovered.
To recover an account:
1. Connect to the switch and log in using an admin account.
2. If a backup database exists, enter the following command.
userConfig --recover
The AD list for a user account is not recovered; recovered accounts are given access only to AD0,
regardless of previous AD assignments
Changing local account passwords
The following rules apply to changing passwords:
• Users can change their own passwords.
• Only users with Admin roles can change the password for other accounts. When changing an Admin
account password, you must provide the current password.
• An admin with ADlist 0-10 cannot change the password on an admin, user, or any role with an ADlist
11-25. The user account being changed must have an ADlist that is a subset of the account that is
making the change.
• A new password must have at least one character different from the old password.
• You cannot change passwords using SNMP.
NOTE: Starting with Fabric OS 4.4.0, accounts with the Admin role can use Web Tools to change
passwords. Starting with Fabric OS 3.2.0, you cannot change default account names.
Starting with Fabric OS 5.1.0 password policies apply.
For information on password behavior when you upgrade (or downgrade) firmware, see ”Upgrading and
downgrading firmware” on page 166.
To change the password for the current login account:
1. Connect to the switch and log in using an admin account.
2. Enter the following command:
passwd
3. Enter the requested information at the prompts.
To change the password for a different account:
1. Connect to the switch and log in using an admin account.
2. Enter the following command:
passwd "name"
where name is the name of the account for which the password is being changed.
3. Enter the requested information at the prompts.
60Managing user accounts
Configuring the local user database
This section covers the following topics:
• ”Distributing the local user database” on page 61
• ”Protecting the local user database from distributions” on page 61
• ”Configuring password policies” on page 62
Distributing the local user database
Distributing the local switch user database and passwords to other switches in the fabric causes the
distributed database to replace (overwrite) the database on the target switch. The ‘Locked’ status of a user
account is not distributed as part of local user database distribution.
When distributing the user database, the database may be rejected for one of the following reasons:
• One of the target switches does not have Fabric OS 5.3.0 or later.
• One of the target switch’s user database is protected.
Distribute the user database and password policies only to Fabric OS 5.2.0 or later switches; the
distribution command fails if any of the target switches are an earlier version.
To distribute the local user database:
When distributing the local user database, all user-defined accounts residing in the receiving switches will
be logged out of any active sessions.
1. Connect to the switch and log in using an admin account.
2. Enter the following command:
distribute -p PWD -d <switch_list>
where <switch_list> is a semicolon-separated list of switch Domain IDs, switch names, or switch WWN
addresses. You can also specify -d “*” to send the local user database only to Fabric OS 5.2.0 or later
switches in the fabric.
Protecting the local user database from distributions
Fabric OS 5.2.0 and later allows you to distribute the user database and passwords to other switches in
the fabric. When the switch accepts a distributed user database, it replaces the local user database with
the user database it receives.
By default, Fabric OS 6.x switches accept the user databases and passwords distributed from other
switches. This section explains how to protect the local user database from being overwritten.
To accept distribution of user databases on the local switch:
1. Connect to the switch and log in using an admin account.
2. Enter the following command:
fddCfg --localaccept PWD
where PWD is the user database policy. Other supported policy databases are SCC, DCC, AUTH,
FCS, and IPFILTER.
To reject distributed user databases on the local switch:
1. Connect to the switch and log in using an admin account.
2. Enter the following command:
fddCfg --localreject PWD
Fabric OS 6.x administrator guide61
Configuring password policies
The password policies described in this section apply to the local switch user database only. Configured
password policies (and all user account attribute and password state information) are synchronized across
CPs and remain unchanged after an HA failover. Password policies can also be manually distributed
across the fabric (see ”Distributing the local user database” on page 61). Following is a list of the
configurable password policies:
• Password strength
• Password history
• Password expiration
• Account lockout
All password policies are enforced during logins to the standby CP. However, you may observe that the
password enforcement behavior on the standby CP is inconsistent with prior login activity because
password state information from the active CP is automatically synchronized with the standby CP, thereby
overwriting any password state information that was previously stored there. Also, password changes are
not permitted on the standby CP.
Password authentication policies configured using the passwdCfg command are not enforced during
initial prompts to change default passwords.
Setting the password strength policy
The password strength policy is enforced across all user accounts, and enforces a set of format rules to
which new passwords must adhere. The password strength policy is enforced only when a new password is
defined. The total of the other password strength policy parameters (lowercase, uppercase, digits, and
punctuation) must be less than or equal to the value of the MinLength parameter.
Use the following attributes to set the password strength policy:
•
Lowercase
Specifies the minimum number of lowercase alphabetic characters that must appear in the password.
The default value is zero. The maximum value must be less than or equal to the MinLength value.
•
Uppercase
Specifies the minimum number of uppercase alphabetic characters that must appear in the password.
The default value is zero. The maximum value must be less than or equal to the MinLength value.
• Digits
Specifies the minimum number of numeric digits that must appear in the password. The default value is
zero. The maximum value must be less than or equal to the MinLength value.
•
Punctuation
Specifies the minimum number of punctuation characters that must appear in the password. All
printable, non-alphanumeric punctuation characters except colon ( : ) are allowed. The colon character
is not allowed because it is incompatible with Web Tools. The default value is zero. The maximum
value must be less than or equal to the MinLength value.
•
MinLength
Specifies the minimum length of the password. The minimum can be from 8 to 40 characters. New
passwords must between the minimum length specified and 40 characters. The default value is 8. The
maximum value must be greater than or equal to the MinLength value.
•
Repeat
Specifies the length of repeated character sequences that will be disallowed. For example, if the
“repeat” value is set to 3, a password “passAAAword” is disallowed because it contains the repeated
sequence “AAA”. A password of “passAAword” would be allowed because no repeated character
sequence exceeds two characters. The range of allowed values is 1 – 40. The default value is 1.
62Managing user accounts
•
Sequence
Specifies the length of sequential character sequences that will be disallowed. A sequential character
sequence is defined as a character sequence in which the ASCII value of each contiguous character
differs by one. The ASCII value for the characters in the sequence must all be increasing or decreasing.
For example, if the “sequence” value is set to 3, a password “passABCword” is disallowed because it
contains the sequence “ABC”. A password of “passABword” would be allowed because it contains no
sequential character sequence exceeding two characters. The range of allowed values is 1 – 40. The
default value is 1.
The following example shows a password strength policy that requires passwords to contain at least
three uppercase characters, four lowercase characters and two numeric digits; the minimum length of
the password is nine characters.
The password history policy prevents users from recycling recently used passwords, and is enforced across
all user accounts when users are setting their own passwords. The password history policy is enforced only
when a new password is defined.
Specify the number of past password values that are disallowed when setting a new password. Allowable
password history values range between 1 and 24. The default value is 2, which means the current
password cannot be reused. The value 2 indicates that the current and the two previous passwords cannot
be used (and so on, up to 24 passwords).
This policy does not verify that a new password meets a minimal standard of difference from prior
passwords, rather, it only determines whether or not a newly-specified password is identical to one of the
specified number (1-24) of previously used passwords.
The password history policy is not enforced when an administrator sets a password for another user;
instead, the user’s password history is preserved and the password set by the administrator is recorded in
the user’s password history.
Setting the password expiration policy
The password expiration policy forces expiration of a password after a configurable period of time, and is
enforced across all user accounts. A warning that password expiration is approaching is displayed when
the user logs in. When a user’s password expires, he or she must change the password to complete the
authentication process and open a user session. You can specify the number of days prior to password
expiration during which warnings will commence. Password expiration does not disable or lock out the
account.
Use the following attributes to set the password expiration policy:
•
MinPasswordAge
Specifies the minimum number of days that must elapse before a user can change a password.
MinPasswordAge values range from 0 to 999. The default value is zero. Setting this parameter to a
non-zero value discourages users from rapidly changing a password in order to circumvent the
password history setting to select a recently-used password. The MinPasswordAge policy is not
enforced when an administrator changes the password for another user.
•
MaxPasswordAge
Specifies the maximum number of days that can elapse before a password must be changed, and is
also known as the password expiration period. MaxPasswordAge values in range from 0 to 999. The
default value is zero. Setting this parameter to zero disables password expiration.
•
Warning
Specifies the number of days prior to password expiration that a warning about password expiration is
displayed. Warning values range from 0 to 999. The default value is 0 days.
When MaxPasswordAge is set to a non-zero value, MinPasswordAge and Warning must be set to a
value that is less than or equal to MaxPasswordAge.
Fabric OS 6.x administrator guide63
Upgrade and downgrade considerations
If you are upgrading from a 5.3.x environment to 6.x, the existing password databases do not contain the
state information that implements password expiration. So, when the password expiration policy is first set
after an upgrade to 6.x, any user who has not changed their password will have their password expiration
period set to the maximum password expiration period. You must explicitly define the password expiration
for users who have not performed a password change subsequent to the upgrade.
For example:
• March 1st—Using a 5.3.x Fabric OS release. User A changes their password.
• April 1—Upgrade to 6.x
• May 1—User B changes his password.
• June 1—The password configuration parameter MaxPasswordAge is set to 90 days.
User A’s password will expire on September 1. User B’s password will expire on August 1.
Setting the account lockout policy
The account lockout policy disables a user account when that user exceeds a specified number of failed
login attempts, and is enforced across all user accounts. You can configure this policy to keep the account
locked until explicit administrative action is taken to unlock it, or the locked account can be automatically
unlocked after a specified period. Administrators can unlock a locked account at any time.
A failed login attempt counter is maintained for each user on each switch instance. The counters for all user
accounts are reset to zero when the account lockout policy is enabled. The counter for an individual
account is reset to zero when the account is unlocked after a LockoutDuration period expires.
The admin account can also have the lockout policy enabled on it. The admin account lockout policy is
disabled by default and uses the same lockout threshold as the other roles. It can be automatically
unlocked after the lockout duration passes or when it is manually unlocked by either a user account that
has a securityAdmin or other Admin role.
• userConfig —change <account name> -u
• passwdCfg —disableadminlockout
Note that the account-locked state is distinct from the account-disabled state.
Use the following attributes to set the account lockout policy:
•
LockoutThreshold
Specifies the number of times a user can attempt to log in using an incorrect password before the
account is locked. The number of failed login attempts is counted from the last successful login.
LockoutThreshold values range from 0 to 999, and the default value is 0. Setting the value to 0 disables
the lockout mechanism.
•
LockoutDuration
Specifies the time, in minutes, after which a previously locked account is automatically unlocked.
LockoutDuration values range from 0 to 99999, and the default value is 30. Setting the value to 0
disables lockout duration, and would require a user to seek administrative action to unlock the account.
The lockout duration begins with the first login attempt after the LockoutThreshold has been
reached. Subsequent failed login attempts do not extend the lockout period.
To enable the admin lockout policy:
1. Log in to the switch using an admin or securityAdmin account.
2. Type passwdCfg
The policy is now enabled.
--enableadminlockout.
To unlock an account:
1. Log in to the switch using an admin or securityAdmin account.
2. Type userConfig
where <account_name> is the name of the user account that is locked out.
64Managing user accounts
--change <account_name> -u.
To disable the admin lockout policy:
1. Log in to the switch using an admin or securityAdmin account.
2. Type passwdCfg --disableadminlockout.
The policy is now disabled.
Denial of service implications
The account lockout mechanism may be used to create a denial of service condition by repeatedly
attempting to log in to an account using an incorrect password. Selected privileged accounts are exempted
from the account lockout policy to prevent them from being locked out from a denial of service attack.
However these privileged accounts may then become the target of password guessing attacks. Audit logs
may be examined to monitor if such attacks are attempted.
Authentication model
This section discusses the authentication model of the switch management channel connections using the
aaaConfig command. Fabric OS 6.x supports the use of both the local user database and the RADIUS
service at the same time; and the local user database and LDAP using Microsoft’s Active Directory in
Windows at the same time. Table 12 on page 66 outlines the available command options.
When configured to use RADIUS or LDAP, the switch acts as a network access server (NAS) and RADIUS
or LDAP client. The switch sends all authentication, authorization, and accounting (AAA) service requests to
the RADIUS or LDAP server. The RADIUS or LDAP server receives the request, validates the request, and
sends its response back to the switch.
The supported management access channels that will integrate with RADIUS and LDAP include serial port,
Telnet, SSH, Web Tools, and API. All these require the switch IP address or name to connect. The RADIUS
server accepts both IPv4 and IP address formats, while LDAP server accepts only an IPv4 address.
A switch can be configured to try both RADIUS or LDAP and local switch authentication.
For systems such as the HP 4/256 SAN Director and DC SAN Backbone Director (DC Director), the switch
IP addresses are aliases of the physical Ethernet interfaces on the CP blades. When specifying client IP
addresses for the logical switches in such systems, make sure the CP IP addresses are used. For accessing
both the active and standby CP, and for the purpose of HA failover, both CP IP addresses of a Director
should be included in the RADIUS or LDAP server configuration.
When configured for RADIUS or LDAP, a switch becomes a RADIUS or LDAP client. In either of these
configurations, authentication records are stored in the RADIUS or LDAP host server database. Login and
logout account name, assigned role, and time-accounting records are also stored on the RADIUS or LDAP
server for each user.
By default, the RADIUS and LDAP services are disabled, so AAA services default to the switch local
database.
To enable RADIUS or LDAP service, it is strongly recommended that you access the CLI through an SSH
connection so that the shared secret is protected. Multiple login sessions can configure simultaneously, and
the last session to apply a change leaves its configuration in effect. After a configuration is applied, it
persists after a reboot or an HA failover.
To enable LDAP service, you will need to install a certificate on the Microsoft Active Directory server.
The configuration applies to all switches and on a Director the configuration replicates itself on a standby
CP blade if one is present. It is saved in a configuration upload and applied in a configuration download.
You should configure at least two RADIUS servers so that if one fails, the other will assume service.
You can set the configuration with both RADIUS or LDAP service and local authentication enabled so that if
the RADIUS or LDAP servers do not respond due to power failure or network problems, the switch uses
local authentication.
Fabric OS 6.x administrator guide65
Consider the following effects of the use of RADIUS or LDAP service on other Fabric OS features:
• When RADIUS or LDAP service is enabled, all account passwords must be managed on the RADIUS or
LDAP server. The Fabric OS mechanisms for changing switch passwords remain functional; however,
such changes affect only the involved switches locally. They do not propagate to the RADIUS or LDAP
server, nor do they affect any account on the RADIUS or LDAP server.
When RADIUS or LDAP is set up for a fabric that contains a mix of switches with and without RADIUS
or LDAP support, the way a switch authenticates users depends on whether or not a RADIUS or LDAP
server is set up for that switch. For a switch with RADIUS or LDAP support and configuration,
authentication bypasses the local password database. For a switch without RADIUS or LDAP support or
configuration, authentication uses the switch’s local account names and passwords.
• The following behaviors apply to Web Tools:
• Web Tools client and server keep a session open after a user is authenticated. A password change
on a switch invalidates an open session and requires the user to log in again. When integrated with
RADIUS or LDAP, a switch password change on the RADIUS or LDAP server does not invalidate an
existing open session, although a password change on the local switch does.
• If you cannot log in because of a RADIUS or LDAP server connection problem, Web Tools displays
a message indicating server outage.
RADIUS and LDAP servers allow you to set up user accounts by their true network-wide identity rather than
by the account names created on a Fabric OS switch. With each account name, assign the appropriate
switch access roles.
RADIUS and LDAP support all the defined RBAC roles described in Table 8 on page 54.
Users must enter their assigned RADIUS or LDAP account name and password when logging in to a switch
that has been configured with RADIUS or LDAP. After the RADIUS or LDAP server authenticates a user, it
responds with the assigned switch role in a Brocade Vendor-Specific Attribute (VSA). If the response does
not have a VSA role assignment, the User role is assigned. If no Administrative Domain is assigned, then
the user is assigned to the default Admin Domain AD0.
n/an/a
against any LDAP database(s) only. If
LDAP service is not available or the
credentials do not match, the login fails.
n/aOn
against any LDAP database first. If
LDAP fails for any reason, authenticates
against the local user database.
The syntax used for assigning VSA-based account switch roles on a RADIUS server is described in
Table 13.
Table 13 Syntax for VSA-based account roles
ItemValueDescription
Type261 o ctet
Length7 or higher 1 octet, calculated by the server
Table 13 Syntax for VSA-based account roles (continued)
ItemValueDescription
Vendor type11 octet, Brocade-Auth-Role; valid attributes for the Brocade-Auth-Role
are:
SwitchAdmin
ZoneAdmin
FabricAdmin
BasicSwitchAdmin
Operator
User
Admin
2Optional: Specifies the Admin Domain member list. For more
information, see ”RADIUS configuration and Admin Domains” on
page 69.
Brocade-AVPairs1
3Brocade-AVPairs2
4Brocade-AVPairs3
5Brocade-AVPairs4
Vendor length2 or higher 1 octet, calculated by server, including vendor-type and vendor-length
Attribute-specific
data
ASCII
string
Multiple octet, maximum 253, indicating the name of the assigned
role and other supported attribute values such as Admin Domain
member list.
Managing Fabric OS users on the RADIUS server
All existing Fabric OS mechanisms for managing local switch user accounts and passwords remain
functional when the switch is configured to use the remote authentication dial-in user service (RADIUS).
Changes made to the local switch database do not propagate to the RADIUS server, nor do the changes
affect any account on the RADIUS server.
Windows 2000 IAS
For example, to configure a Windows 2000 internet authentication service (IAS) server to use VSA to pass
the Admin role to the switch in the dial-in profile, the configuration specifies the Vendor code (1588),
Vendor-assigned attribute number (1), and attribute value (admin), as shown in the following:
68Managing user accounts
Linux FreeRadius server
For the configuration on a Linux FreeRadius server, define the following in a vendor dictionary file called
dictionary.brocade. Include the values outlined in Table 14.
Table 14dictionary.brocade file entries
IncludeKeyValue
VENDORBrocade1588
ATTRIBUTEBrocade-Auth-Role1 string Brocade
AdminDomain
After you have completed the dictionary file, define the role for the user in a configuration file. For
example, to grant the user jsmith the Admin role, you would add the following statement to the
configuration file:
When configuring users with Admin Domains, you must also include the Admin Domain member list. This
section describes the way that you configure attribute types for this configuration.
The values for the new attribute types use the syntax key=val[;key=val], where key is a text description of
attributes, value is the attribute value for the given key, the equal sign (=) is the separator between key and
value, and the semi-colon (;) is an optional separator for multiple key-value pairs.
Multiple key-value pairs can appear for one Vendor-Type code. Key-value pairs with the same key name
may be concatenated across multiple Vendor-Type codes. You can use any combination of the Vendor-Type
codes to specify key-value pairs. Note that a switch always parses these attributes from Vendor-Type code 2 to Vendor-Type code 4.
Only two kinds of keys are accepted; all other keys are ignored. The following keys are accepted:
• HomeAD is the designated home Admin Domain for the account. The valid value is between 0 to 255,
inclusive. The first valid HomeAD key-value pair is accepted by the switch, and any additional
HomeAD key-value pairs are ignored.
• ADList is a comma-separated list of Administrative Domain numbers to which this account is a member.
Valid numbers range from 0 to 255, inclusive. A dash between two numbers specifies a range. Multiple
ADList key-value pairs within the same or across the different Vendor-Type codes are concatenated.
Multiple occurrences of the same AD number are ignored.
RADIUS authentication requires that the account have a valid role through the attribute type
Brocade-Auth-Role. The additional attribute values ADList and HomeAD are optional. If they are
unspecified, the account can log in with AD0 as its member list and home Admin Domain. If there is an
error in ADList or HomeAD specification, the account cannot log in until the AD list is corrected; an error
message is displayed.
For example, on a Linux FreeRadius Server, the user (user-za) with the following settings takes the
“ZoneAdmin” role, with AD member list: 1, 2, 4, 5, 6, 7, 8, 9, 12; the Home Admin Domain will be 1.
You must know the switch IP address, in either IPv4 or IPv6 notation, or name to connect to switches. Use
the ipAddrShow command to display a switch IP address.
For Directors (chassis-based systems), the switch IP addresses are aliases of the physical Ethernet interfaces
on the CP blades. When specifying client IP addresses for the logical switches in such systems, make sure
the CP blade IP addresses are used. For accessing both the active and standby CP blade, and for the
purpose of HA failover, both of the CP blade IP addresses should be included in the RADIUS server
configuration.
User accounts should be set up by their true network-wide identity, rather than by the account names
created on a Fabric OS switch. Along with each account name, the administrator should assign
appropriate switch access roles. To manage a fabric, these roles can be User, Admin, and SecurityAdmin.
When they log in to a switch configured with RADIUS, users enter their assigned RADIUS account names
and passwords at the prompt. After the RADIUS server authenticates a user, it responds with the assigned
switch role in a Brocade Vendor-Specific Attribute (VSA), as defined in the RFC. An Authentication-Accept
response without such VSA role assignment automatically assigns the user role.
The following sections describe how to configure a RADIUS server to support clients under different
operating systems.
Linux
The following procedures work for FreeRADIUS on Solaris and Red Hat Linux. FreeRADIUS is a freeware
RADIUS server that you can find at the following website:
www.freeradius.org
Follow the installation instructions at the web site. FreeRADIUS runs on Linux (all versions), FreeBSD,
NetBSD, and Solaris. If you make a change to any of the files used in this configuration, you must stop the
server and restart it for the changes to take effect.
FreeRADIUS installation places the configuration files in $PREFIX/etc/raddb. By default, the PREFIX is /usr/local.
Configuring RADIUS service on Linux consists of the following tasks:
• Adding the Brocade attribute to the server
• Creating the user
• Enabling clients
To add the Brocade attribute to the server:
1. Create and save the file $PREFIX/etc/raddb/dictionary.brocade with the following information:
#
# Brocade FabricOS 5.0.1 dictionary
#
VENDOR Brocade 1588
#
# attribute 1 defined to be Brocade-Auth-Role
# string defined in user configuration
#
ATTRIBUTE Brocade-Auth-Role 1 string Brocade
This defines the Brocade vendor ID as 1588, the Brocade attribute 1 as Brocade-Auth-Role, and it is a
string value.
2. Open the file $PREFIX/etc/raddb/dictionary in a text editor and add the line:
$INCLUDE dictionary.brocade
As a result, the file dictionary.brocade is located in the RADIUS configuration directory and loaded for
use by the RADIUS server.
70Managing user accounts
To create the user:
• Open the $PREFIX/etc/raddb/user file in a text editor and add user names and roles for users who will
be accessing the switch and authenticating RADIUS.
The user will log in using the role specified with Brocade-Auth-Role. The valid roles include Root, Admin,
SwitchAdmin, ZoneAdmin, SecurityAdmin, BasicSwitchAdmin, FabricAdmin, Operator and User. You
must use quotation marks around “password” and “role”.
For example, to set up an account called JohnDoe with the Admin role:
When you use Network Information Service (NIS) for authentication, the only way to enable
authentication with the password file is to force the switch to authenticate using Password Authentication
Protocol (PAP); this requires the -a pap option with the aaaConfig command.
Clients are the switches that will use the RADIUS server; each client must be defined. By default, all IP
addresses are blocked.
4/256 SAN Director and DC SAN Backbone Director (short name, DC Director) models send their
RADIUS requests using the IP address of the active CP. When adding clients, add both the active and
standby CP IP addresses so that, in the event of a failover, users can still log in to the switch.
To enable clients:
1. Open the $PREFIX/etc/raddb/client.config file in a text editor and add the switches that are to be
configured as RADIUS clients.
For example, to configure the switch at IP address 10.32.170.59 as a client:
client 10.32.170.59
In this example, shortname is an alias used to easily identify the client. Secret is the shared secret
between the client and server. Make sure the shared secret matches that configured on the switch (see
”To add a RADIUS server to the switch configuration:” on page 76).
Save the file $PREFIX/etc/raddb/client.config then start the RADIUS server as follows:
$PREFIX/sbin/radiusd
Windows 2000
The instructions for setting up RADIUS on a Windows 2000 server are listed here for your convenience but
are not guaranteed to be accurate for your network environment. Always check with your system
administrator before proceeding with setup.
Configuring RADIUS service on Windows 2000 consists of the following tasks:
• Installing internet authentication service (IAS)
For more information and instructions on installing IAS, refer to the Microsoft web site.
• Enabling the Challenge Handshake Authentication Protocol (CHAP)
If CHAP authentication is required, then Windows must be configured to store passwords with
reversible encryption. Reverse password encryption is not the default behavior; it must be enabled.
If a user is configured prior to enabling reverse password encryption, then the user’s password is stored
and cannot utilize CHAP. To use CHAP, the password must be re-entered after encryption is enabled. If
the password is not re-entered, then CHAP authentication will not work and the user will be unable to
authenticate from the switch.
• Configuring a user
IAS is the Microsoft implementation of a RADIUS server and proxy
database to verify user login credentials; it does not list specific users, but instead lists user groups.
secret= Secret
shortname= Testing Switch
nastype= other
. IAS uses the Windows native user
Fabric OS 6.x administrator guide71
Each user group should be associated with a specific switch login role. For example, you should
configure a user group for root, admin, factory, switchadmin, and user, and then add any users whose
logins you want to associate to the appropriate group.
• Configuring the server
To enable CHAP:
1. From the Windows Start menu, select Programs > Administrative Tools > Local Security
Policy to open the Local Security Settings window.
2. In the Local Security Settings window, expand the Account Policies folder and select the Password
Policy folder.
3. From the list of policies in the Password Policy folder, right-click Store password using reversible
encryption for all users in the domain, and select Security from the pop-up menu.
4. An additional Local Security Settings window appears. Click the Enabled radio button and then click
OK.
To configure users:
1. From the Windows Start menu, select Programs > Administrative Tools > Computer
Management to open the Computer Management window.
2. In the Computer Management window, expand the Local Users and Groups folder and select the
Groups folder.
3. Right-click the Groups folder and select New Group from the pop-up menu.
4. In the New Group window, provide a Name and Description for the group and click Add.
5. In the Select Users or Groups window, select the user (who should already have been configured) you
want to add to the group and click Add.
6. Repeat this for every user you want to add. When you have completed adding all users, click OK.
7. In the New Group window, verify the users you added in step 4 appear in the Members field; then
click Create to create this group.
The new groups are created for each login type (admin, switchAdmin, user).
To configure the RADIUS server:
1. From the Windows Start menu, select Programs > Administrative Tools > Internet
Authentication Service to open the Internet Authentication Service window.
2. In the Internet Authentication Service window, right-click the Clients folder and select New
Client from the pop-up menu.
A client is the device that uses the RADIUS server; in this case, it is the switch.
3. In the Add Client window, provide the following:
Friendly name—The friendly name should be an alias that is easily recognizable as the switch to
which you are connecting.
Protocol—Select RADIUS as the protocol.
4. In the Add RADIUS Client window, provide the following:
Client address
(IP or DNS)—Enter the IP address of the switch.
Client-Vendor—Select RADIUS Standard.
Shared secret—Provide a password. Shared secret is a password used between the client device
and server to prevent IP address spoofing by unwanted clients. Keep your shared secret password in a
safe place. You will need to enter this password in the switch configuration.
After clicking Finish, repeat step 2 through step 4 for all switches on which RADIUS authentication will be
used.
5. In the Internet Authentication Service window, right-click the Remote Access Policies folder; then select
New Remote Access Policy from the pop-up window.
A remote access policy must be created for each login role (Root, Admin, Factory, SwitchAdmin, and
User) for which you want to use RADIUS. Apply this policy to the user groups that you already created.
72Managing user accounts
6. In the Add Remote Access Policy window, enter an easily identifiable Policy friendly name that will
enable you to see the switch login for which the policy is being created; then click Next.
7. After the Add Remote Access Policy window refreshes, click Add.
8. In the Select Attribute window, select Windows Groups and click Add.
9. In the Groups window, click Add.
10. In the Select Groups window, select the user-defined group for which you are creating a policy and
click Add. After adding all appropriate groups, click OK. In the Groups window, click OK.
11 . In the Add Remote Access Policy window, confirm that the Conditions section displays the group(s) that
you selected and click Next.
12 . After the Add Remote Access Policy window refreshes, select the Grant remote access
permission radio button and click Next.
13 . After the Add Remote Access Policy window refreshes again, click Edit Profile.
14. In the Edit Dial-in Profile window, click the Authentication tab and check only the Encrypted
Authentication (CHAP) and Unencrypted Authentication (PAP, SPAP) checkboxes; then
click the Advanced tab and click Add.
15 . In the Add Attributes window, select Vendor-Specific and click Add.
16. In the Multivalued Attribute Information window, click Add.
17. In the Vendor-Specific Attribute Information window, click the Enter Vendor Code radio button and
enter the value 158 8. Click the Yes. It conf orms radio button, and then click Configure
Attribute....
18. In the Configure VSA (RFC compliant) window, enter the following values and click OK.
Vendor-assigned attribute number—Enter the value 1.
Attribute format—Enter String.
Attribute value—Enter the login role (Root, Admin, SwitchAdmin, User, etc.) the user group must use
to log in to the switch.
19. In the Multivalued Attribute Information window, click OK
20.In the Edit Dial-in Profile window, remove all additional parameters (except the one you just added,
“Vendor-Specific”) and click OK.
21. In the Add Remote Access Policy window, click Finish.
.
After returning to the Internet Authentication Service window, repeat step 5 through step 21 to add
additional policies for all login types for which you want to use the RADIUS server. After this is done, you
can configure the switch.
LDAP configuration and Microsoft’s Active Directory
LDAP provides user authentication and authorization using Microsoft's Active Directory service in
conjunction with LDAP on the switch. The following are restrictions when using LDAP:
• In Fabric OS 6.x there will be no password change through Active Directory.
• There is no automatic migration of newly created users from local switch database to Active Directory.
This is a manual process explained later.
• LDAP authentication is used on the local switch only and not for the entire fabric.
Roles for users can be added through the Microsoft Management Console. Groups created in Active
Directory must correspond directly to the RBAC user roles on the switch. Role assignments can be achieved
by including the user in the respective group. A user can be assigned to multiple groups like Switch Admin
and Security Admin. For more information on RBAC roles, see ”Using Role-Based Access Control (RBAC)”
on page 54.
NOTE: All instructions involving Microsoft’s Active Directory can be obtained from
www.microsoft.com
needs your network environment may have.
. Confer with your network administrator prior to configuration for any special
Fabric OS 6.x administrator guide73
To set up LDAP:
1. Install a certificate on the Windows Active Directory server for LDAP. Create a user in Microsoft Active
Directory server. For instructions on how to create a user, refer to www.microsoft.com
or Microsoft
documentation to create a user in your Active Directory.
2. Create a group name that uses the switch’s role name so that the Active Directory group’s name is the
same as the switch’s role name.
3. Associate the user to the group by adding the user to the group. For instructions on how to create a user
refer to www.microsoft.com
or Microsoft documentation to create a user in your Active Directory.
4. Add the user’s Administrative Domains to the CN_list by editing the adminDescription value.
This will map the admin domains to the user name. Multiple admin domains can be added as a string
value separated by the underscore character ( _ ).
To create a user:
To create a user in Active Directory, refer to www.microsoft.com
or Microsoft documentation. There are no
special attributes.
To create a group:
To create a group in Active Directory, refer to www.microsoft.com
or Microsoft documentation. You will
need to verify that the group uses the following attributes:
• The name of the group has to match the RBAC role.
• The Group Type must be Security.
• The Group Scope must be Global.
To assign the group (role) to the user:
To assign the user to a group in the Active Directory, refer to www.microsoft.com
or Microsoft
documentation. You will need to verify that the user has the following attributes:
1. Update the memberOf field with the login role (Root, Admin, SwitchAdmin, User, etc.) that the user must
use to log in to the switch.
2. From the Windows Start menu, select Programs> Administrative Tools> ADSI.msc
ADSI is a Microsoft Windows Resource Utility. This will need to be installed to proceed with the rest of
the setup. For Windows 2003, this utility comes with Service Pack 1 or you can download this utility
from the Microsoft website.
3. Go to CN=Users0
4. Right click on select Properties. Click the Attribute Editor tab.
5. Double-click the adminDescription attribute.
This opens the String Attribute Editor dialog box.
6. Enter the value for the admin domains separated by an underscore ( _ ) into the Value field.
Example
adlist_0_10_200_endAd
Home Admin Domain (homeAD) for the user will be the first value in the adlist (Admin Domain list). If a
user has no values assigned in the adlist attribute, then the homeAD ‘0’ will be the default
administrative domain for the user.
NOTE: You can perform batch operations using the Ldifde.exe utility. For more information on importing
and exporting schemas, refer to your Microsoft documentation or visit www.microsoft.com
74Managing user accounts
.
Configuring authentication servers on the switch
RADIUS and LDAP configuration of the switch is controlled by the aaaConfig command.
At least one RADIUS or LDAP server must be configured before you can enable RADIUS or LDAP service.
You can configure the RADIUS or LDAP service even if it is disabled on the switch. You can configure up to
five RADIUS or LDAP servers. You must be logged in as admin or switchadmin to configure the RADIUS
service.
NOTE: On dual-CP switches (the 4/256 SAN Director and the DC Director), the switch sends its RADIUS
or LDAP request using the IP address of the active CP. When adding clients, add both the active and
standby CP IP addresses so that users can still log in to the switch in the event of a failover.
RADIUS or LDAP configuration is chassis-based configuration data. On platforms containing multiple
switch instances, the configuration applies to all instances. The configuration is persistent across reboot
and firmwareDownload. On a chassis-based system, the command must replicate the configuration to
the standby CP.
Multiple login sessions can invoke the command simultaneously. The last session that applies the change
will be the one whose configuration is in effect. This configuration is persistent after an HA failover.
The RADIUS or LDAP servers are contacted in the order they are listed, starting from the top of the list and
moving to the bottom.
The following procedures show how to use the aaaConfig command to set up a switch for RADIUS or
LDAP service.
To display the current RADIUS configuration:
1. Connect to the switch and log in using an admin account.
2. Enter this command:
switch:admin> aaaConfig --show
If a configuration exists, its parameters are displayed. If RADIUS or LDAP service is not configured, only
the parameter heading line is displayed. Parameters include:
PositionThe order in which servers are contacted to provide service.
ServerThe server names or IPv4 or IPv6 addresses.
PortThe server ports.
SecretThe shared secrets.
TimeoutsThe length of time servers have to respond before the next server is
contacted.
AuthenticationThe type of authentication being used on servers.
Fabric OS 6.x administrator guide75
To add a RADIUS server to the switch configuration:
1. Connect to the switch and log in using an admin account.
2. Enter this command:
switch:admin> aaaConfig --add <server> [-p port] [-s secret] [-t timeout]
[-a pap | chap | peap-mschapv2]
serverEnter either a server name or IPv4 or IPv6
address. Avoid duplicating server listings
(that is, listing the same server once by name
and again by IP address). Up to five servers
can be added to the configuration.
-p portOptional: Enter a server port. The default is
port 1812.
-s secretOptional: Enter a shared secret. The default is
“sharedsecret”. Secrets can be from 8 to 40
alphanumeric characters long. Make sure that
the secret matches that configured on the
server.
-t timeoutOptional: Enter the length of time (in seconds)
that the server has to respond before the next
server is contacted. The default is three
seconds. Time-out values can range from 1 to 30
seconds.
-a
[pap|chap|peap-msc
hapv2]
Specify PAP, CHAP or PEAP as authentication
protocol. Use peap-mschapv2 to provide
encrypted authentication channel between the
switch and server.
To add an LDAP server to the switch configuration:
1. Connect to the switch and log in using an admin account.
serverEnter either a server name or IPv4 address. Microsoft’s Active
Directory does not support IPv6 addresses. Avoid duplicating
server listings (that is, listing the same server once by name and
again by IP address). Up to five servers can be added to the
configuration.
-p portOptional: Enter a server port. The default is port 389.
-t timeoutOptional: Enter the length of time (in seconds) that the server has
to respond before the next server is contacted. The default is three
seconds. Time-out values can range from 1 to 30 seconds.
-ddomain_nameEnter the name of the Windows domain.
At least one RADIUS or LDAP server must be configured before you can enable the RADIUS or LDAP
service.
If no RADIUS or LDAP configuration exists, turning it on triggers an error message. When the command
succeeds, the event log indicates that the configuration is enabled or disabled.
76Managing user accounts
NOTE: When the RADIUS authentication mode is set to radius;local, you cannot downgrade the Fabric
OS to any version earlier than 5.2.0. Previous versions do not support the radius;local mode.
When the LDAP authentication mode is set to ldap;local, you cannot downgrade the Fabric OS to any
version earlier than 6.x. Previous versions do not support the ldap;local mode.
To enable and disable a RADIUS or LDAP server:
1. Connect to the switch and log in using an admin account.
2. Enter this command to enable RADIUS or LDAP using the local database:
where you specify the type of server as either RADIUS or LDAP, but not both. Local is used for local
authentication if the user authentication fails on the RADIUS or LDAP server.
serverEnter either the name or IP address of the server to be changed.
-p portOptional: Enter a server port. The default is 1812.
-s shared secretOptional: Enter a shared secret.
-t timeoutOptional: Enter the length of time (in seconds) the server has to
respond before the next server is contacted.
-a
[pap|chap|peap-mscha
pv2]
NOTE: Protected Extensible Authentication Protocol (PEAP) is used to authenticate users and clients. It is based on
extensible authentication protocol (EAP) and transport layer security (TLS).
When PEAP is configured on the switch, clients running Fabric Manager cannot authenticate.
Specify PAP, CHAP or PEAP as authentication protocol. Use
peap-mschapv2 to provide security on the switch.
Fabric OS 6.x administrator guide77
To change an LDAP server configuration:
1. Connect to the switch and log in using an admin account.
2. Enter this command:
switch:admin> aaaConfig --change server [-p port] [-t timeout] [-d domain_name]
server
Enter either a server name or IPv4 address. Microsoft’s Active Directory
does not support IPv6 addresses. Avoid duplicating server listings (that is,
listing the same server once by name and again by IP address). Up to five
servers can be added to the configuration.
-p port
-t timeout
Optional: Enter a server port. The default is port 389.
Optional: Enter the length of time (in seconds) that the server has to
respond before the next server is contacted. The default is three seconds.
Time-out values can range from 1 to 30 seconds.
-d
domain_name
Enter the name of the Windows domain.
To change the order in which RADIUS or LDAP servers are contacted for service:
1. Connect to the switch and log in using an admin account.
2. Enter this command:
switch:admin> aaaConfig --move server to_position
serverEnter either the name or IP address of the server whose position is to be changed.
to_position Enter the position number to which the server is to be moved.
When the command succeeds, the event log indicates that a server configuration is changed.
Enabling and disabling local authentication as backup
It is useful to enable local authentication so that the switch can take over authentication locally if the
RADIUS or LDAP servers fail to respond because of power outage or network problems. To enable or
disable local authentication, enter the following command for RADIUS:
For details about this command see Table 12 on page 66.
When local authentication is enabled and the RADIUS or LDAP servers fail to respond, you can log in to
the default switch accounts (admin and user) or any user-defined account. You must know the passwords of
these accounts.
When the command succeeds, the event log indicates that local database authentication is disabled or
enabled.
Boot PROM password
The boot PROM password provides an additional layer of security by protecting the boot PROM from
unauthorized use. Setting a recovery string for the boot PROM password enables you to recover a lost boot
PROM password by contacting HP. Without the recovery string, a lost boot PROM password cannot be
recovered.
You should set the boot PROM password and the recovery string on all switches, as described in ”Setting
the boot PROM password with a recovery string” on page 79. If your site procedures dictate that you set
the boot PROM password without the recovery string, see ”Setting the boot PROM password without a
recovery string” on page 81.
78Managing user accounts
Setting the boot PROM password with a recovery string
To set the boot PROM password with a recovery string, refer to the section that applies to your switch
model.
NOTE: Setting the boot PROM password requires accessing the boot prompt, which stops traffic flow
through the switch until the switch is rebooted. You should perform this procedure during a planned down
time.
HP StorageWorks 4/8 or 4/16, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, Brocade
4Gb SAN Switch for HP c-Class BladeSystem, SAN Switch 4/32, 4/64 SAN Switch, SAN Switch
4/32B, 400 Multi-protocal (MP) Router
The instructions contained within this section are only for the switches listed in the title. If your switch is not
listed, please contact HP for instructions.
To set the boot PROM password for a switch with a recovery string:
1. Connect to the serial port interface.
2. Press ESC within four seconds after the message “Press escape within 4 seconds...” displays.
The following options are available:
OptionDescription
1 Start system. Continues the system boot process.
2 Recovery password.Lets you set the recovery string and the boot PROM password.
3 Enter command shell.Provides access to boot parameters.
3. Enter 2.
If no password was previously set, the following message displays:
Recovery password is NOT set. Please set it now.
If a password was previously set, the following messages display:
Send the following string to Customer Support for password recovery:
afHTpyLsDo1Pz0Pk5GzhIw==
Enter the supplied recovery password.
Recovery Password:
4. Enter the recovery password (string).
The recovery string must be between 8 and 40 alphanumeric characters. A random string that is 15
characters or longer is recommended for higher security. The firmware prompts for this password only
once. It is not necessary to remember the recovery string because it is displayed the next time you enter
the command shell.
The following prompt displays:
New password:
5. Enter the boot PROM password, then re-enter it when prompted. The password must be eight
alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
The new password is automatically saved.
6. Type reset at the prompt to reboot the switch.
Fabric OS 6.x administrator guide79
4/256 SAN Director and DC SAN Backbone Director (short name, DC Director)
The boot PROM and recovery passwords must be set for each CP blade on the 4/256 SAN Director or DC
Director.
To set the boot PROM password for a Director with a recovery string:
1. Connect to the serial port interface on the standby CP blade.
2. Connect to the active CP blade by serial or Telnet and enter the haDisable command to prevent
failover during the remaining steps.
3. Reboot the standby CP blade by sliding the On/Off switch on the ejector handle of the standby CP
blade to Off, and then back to On.
4. Press ESC within four seconds after the message “Press escape within 4 seconds...” displays.
The following options are available:
OptionDescription
1 Start system. Continues the system boot process.
2 Recovery password.Lets you set the recovery string and the boot PROM password.
3 Enter command shell. Provides access to boot parameters.
5. Enter 2.
If no password was previously set, the following message displays:
Recovery password is NOT set. Please set it now.
If a password was previously set, the following messages display:
Send the following string to Customer Support for password recovery:
afHTpyLsDo1Pz0Pk5GzhIw==
Enter the supplied recovery password.
Recovery Password:
6. Enter the recovery password (string).
The recovery string must be between 8 and 40 alphanumeric characters. A random string that is 15
characters or longer is recommended for higher security. The firmware only prompts for this password
once. It is not necessary to remember the recovery string because it is displayed the next time you enter
the command shell.
The following prompt displays:
New password:
7. Enter the boot PROM password, then re-enter it when prompted. The password must be eight
alphanumeric characters (any additional characters are not recorded). Record this password for future
use.
The new password is automatically saved (the saveEnv command is not required).
8. Connect to the active CP blade using serial or Telnet and enter the haEnable command to restore
High Availability; then fail over the active CP blade by entering the haFailover command.
Traffic flow through the active CP blade resumes when the failover is complete.
9. Connect the serial cable to the serial port on the new standby CP blade (previously the active
CP blade).
10. Repeat step 2 through step 7 for the new standby CP blade (each CP blade has a separate boot PROM
password).
11 . Connect to the active CP blade by serial or Telnet and enter the haEnable command to restore High
Availability.
80Managing user accounts
Setting the boot PROM password without a recovery string
Although you can set the boot PROM password without also setting the recovery string, it is strongly
recommended that you set both the password and the string as described in ”Setting the boot PROM
password with a recovery string” on page 79. If your site procedures dictate that you must set the boot
PROM password without the string, follow the procedure that applies to your switch model.
Setting the boot PROM password requires accessing the boot prompt, which stops traffic flow through the
switch until the switch is rebooted. You should perform this procedure during a planned down time.
HP StorageWorks 4/8 or 4/16, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, Brocade
4Gb SAN Switch for HP c-Class BladeSystem, SAN Switch 4/32, 4/64 SAN Switch, SAN Switch
4/32B, 400 Multi-protocal (MP) Router
The password recovery instructions contained within this section are only for the switches listed in the title.
If your switch is not listed, contact HP for instructions.
To set the boot PROM password for a switch without a recovery string:
1. Create a serial connection to the switch.
2. Enter the reboot command to reset the switch.
3. Press ESC within four seconds after the message “Press escape within 4 seconds...” displays.
The following options are available:
OptionDescription
1 Start system. Continues the system boot process.
2 Recovery password.Lets you set the recovery string and the boot PROM password.
3 Enter command shell. Provides access to boot parameters.
4. Enter 3.
5. At the shell prompt, enter the passwd command.
NOTE: The passwd command only applies to the boot PROM password when it is entered from the boot
interface.
6. Enter your boot PROM password at the prompt, then re-enter it when prompted. The password must be
eight alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
7. Enter the saveEnv command to save the new password.
8. Enter the reboot command to reset the switch.
4/256 SAN Director and DC SAN Backbone Director (short name, DC Director)
On 4/256 SAN Director and DC Director models, set the password on the standby CP blade, fail over,
and then set the password on the previously active (now standby) CP blade to minimize disruption to the
fabric.
To set the boot PROM password for a Director without a recovery string:
1. Determine the active CP blade by opening a Telnet session to either CP blade, connecting as admin,
and entering the haShow command.
2. Connect to the active CP blade by serial or Telnet and enter the haDisable command to prevent
failover during the remaining steps.
3. Create a serial connection to the standby CP blade.
4. Reboot the standby CP blade by sliding the On/Off switch on the ejector handle of the standby CP
blade to Off, and then back to On.
This causes the blade to reset.
5. Press ESC within four seconds after the message
Press escape within 4 seconds... displays.
Fabric OS 6.x administrator guide81
The following options are available:
OptionDescription
1 Start system. Continues the system boot process.
2 Recovery password.Lets you set the recovery string and the boot PROM password.
3 Enter command shell. Provides access to boot parameters.
6. Enter 3.
7. Enter the passwd command at the shell prompt.
NOTE: The passwd command only applies to the boot PROM password when it is entered from the boot
interface.
8. Enter your boot PROM password at the prompt, then re-enter it when prompted. The password must be
eight alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
9. Enter the saveEnv command to save the new password.
10. Reboot the standby CP blade by entering the reset command.
11 . Connect to the active CP blade by serial or Telnet and enter the haEnable command to restore High
Availability; then fail over the active CP blade by entering the haFailover command.
Traffic resumes flowing through the newly active CP blade after it has completed rebooting.
12 . Connect the serial cable to the serial port on the new standby CP blade (previously the active
CP blade).
13 . Repeat step 3 through step 10 for the new standby CP blade.
14. Connect to the active CP blade by serial or Telnet and enter the haEnable command to restore High
Availability.
Recovering forgotten passwords
If you know the root password, you can use this procedure to recover the password for the default accounts
of user, admin, and factory.
To recover passwords:
1. Open a CLI connection (serial or Telnet) to the switch.
OR
Connect to the primary FCS switch, if one exists in your fabric.
2. Log in as root.
3. Enter the command for the type of password that was lost:
passwd user
passwd admin
passwd factory
4. Enter the requested information at the prompts.
To recover a lost root password or boot PROM password, contact HP. You must have previously set a
recovery string to recover the boot PROM password.
NOTE: Contact HP to recover a lost root password or boot PROM password. You must have previously set
a recovery string to recover the boot PROM password.
82Managing user accounts
3Configuring standard security features
This chapter provides information and procedures for configuring standard Fabric OS security features such
as protocol and certificate management.
IMPORTANT: Secure Fabric OS is no longer supported in Fabric OS 6.x.
Secure protocols
Fabric OS supports the secure protocols shown in Table 15.
Table 15Secure protocol support
ProtocolDescription
SSLSupports SSLv3, 128-bit encryption by default. Fabric OS uses SSL to support
HTTPS. A certificate must be generated and installed on each switch to
enable SSL.
HTTPSWeb Tools supports the use of HTTPS.
Secure File Copy (scp)Configuration upload and download support the use of scp.
SNMPv3SNMPv1 and v2 are also supported.
Simple Network Management Protocol (SNMP) is a standard method for monitoring and managing
network devices. Using SNMP components, you can program tools to view, browse, and manipulate switch
variables and set up enterprise-level management processes.
Every switch carries an SNMP agent and Management Information Base (MIB). The agent accesses MIB
information about a device and makes it available to a network manager station. You can manipulate
information of your choice by trapping MIB elements using the Fabric OS CLI, Web Tools, or Fabric
Manager.
The SNMP Access Control List (ACL) provides a way for the administrator to restrict SNMP get and set
operations to certain hosts and IP addresses. This is used for enhanced management security in the storage
area network.
For details on Brocade MIB files, naming conventions, loading instructions, and information about using
Brocade's SNMP agent, see the Fabric OS MIB Reference.
Table 16 describes additional software or certificates that you must obtain to deploy secure protocols.
Table 16Items needed to deploy secure protocols
ProtocolHost sideSwitch side
SSHSSH clientNone
HTTPSNo requirement on host
side except a browser that
supports HTTPS
Secure File Copy (scp)SSH daemon, scp serverNone
SNMPv1, SNMPv2,
SNMPv3
NoneNone
Switch IP certificate for SSL
Fabric OS 6.x administrator guide83
The security protocols are designed with the four main usage cases described in Table 17.
Table 17Main security scenarios
FabricManagement
Comments
interfaces
NonsecureNonsecureNo special setup is needed to use Telnet or HTTP.
NonsecureSecure Secure protocols may be used. An SSL switch certificate must be
installed if HTTPS is used.
SecureSecureSecure protocols are supported on Fabric OS v4.1.0 and later
switches. Switches running earlier Fabric OS versions can be
part of the secure fabric, but they do not support secure
management.
Secure management protocols must be configured for each
participating switch. Nonsecure protocols may be disabled on
nonparticipating switches.
If SSL is used, then certificates must be installed.
SecureNonsecure You must use SSH because Telnet is not allowed with some
features, such as RADIUS.
Nonsecure management protocols are necessary under these
circumstances:
The fabric contains switches running Fabric OS v3.2.0.
The presence of software tools that do not support secure
protocols: for example, Fabric Manager v4.0.0.
The fabric contains switches running Fabric OS versions earlier
than v4.4.0. Nonsecure management is enabled by default.
Ensuring network security
To ensure security, Fabric OS supports secure shell (SSH) encrypted sessions in 4.1.x and later. SSH
encrypts all messages, including the client’s transmission of password during login. The SSH package
contains a daemon (sshd), which runs on the switch. The daemon supports a wide variety of encryption
algorithms, such as Blowfish-CBC and AES.
NOTE: To maintain a secure network, you should avoid using Telnet or any other unprotected application
when you are working on the switch.
The FTP protocol is also not secure. When you use FTP to copy files to or from the switch, the contents are
in clear text. This includes the remote FTP server's login and password. This limitation affects the following
commands: saveCore, configUpload, configDownload, and firmwareDownload.
Commands that require a secure login channel must originate from an SSH session. If you start an SSH
session, and then use the login command to start a nested SSH session, commands that require a secure
channel will be rejected.
Fabric OS 4.1.0 and later supports SSH protocol version 2.0 (ssh2). For more information on SSH, refer to
the SSH IETF website:
http://www.ietf.org/ids.by.wg/secsh.html
For more information, refer to SSH, The Secure Shell: The Definitive Guide by Daniel J. Barrett, Richard
Silverman.
84Configuring standard security features
Configuring the Telnet protocol
Telnet is enabled by default. To prevent users from passing clear text passwords over the network when
they connect to the switch, you can block the Telnet protocol using an IP Filter policy.
NOTE: Before blocking Telnet, make sure you have an alternate method of establishing a connection with
the switch.
Blocking Telnet
To block Telnet:
1. Connect to the switch and log in as admin.
Connect through some means other than Telnet: for example, through SSH.
4. Save the new ipfilter policy by typing the following command:
ipfilter --save [policyname]
where [policyname] is the name of the policy and is optional.
Example
ipfilter --save block_telnet_v4
5. Activate the new ipfilter policy by typing the following command:
ipfilter --activate <policyname>
where <policyname> is the name of the policy you created in step
Example
ipfilter --activate block_telnet_v4
Unblocking Telnet
To unblock Telnet:
1. Connect to the switch through a means other than Telnet (for example, SSH) and log in as admin.
2. Type in the following command:
ipfilter –delete <telnet_policyname>
where <telnet_policyname> is the name of the Telnet policy.
3. To permanently delete the policy, type the following command:
ipfilter --save
For more information on IP Filter policies, refer to ”Configuring advanced security features” on page 99.
Fabric OS 6.x administrator guide85
Blocking listeners
HP switches block Linux subsystem listener applications that are not used to implement supported features
and capabilities. Table 18 lists the listener applications that Brocade switches either block or do not start.
Table 18Blocked listener applications
Listener application 4/256 SAN Director and DC SAN
Backbone Director (short name, DC
Director)
HP StorageWorks 4/8 SAN Switch, 4/16
SAN Switch, Brocade 4Gb SAN Switch for
HP p-Class BladeSystem, Brocade 4Gb
SAN Switch for HP c-Class BladeSystem,
SAN Switch 4/32, 4/64 SAN Switch, SAN
Switch 4/32B, 400 Multi-protocol Router
FC10-6, FC4-48, FC4-16IP, FC8-16,
FC8-32, FC8-48, and FR4-18i blades
chargenDisabledDisabled
echoDisabledDisabled
daytimeDisabledDisabled
discardDisabledDisabled
ftpDisabledDisabled
rexecBlock with packet filterDisabled
rshBlock with packet filterDisabled
rloginBlock with packet filterDisabled
timeBlock with packet filterDisabled
rstatsDisabledDisabled
rusersDisabledDisabled
Accessing switches and fabrics
If you are using the FC-FC Routing Service, be aware that the secModeEnable command is no longer
supported in Fabric OS 6.x.
Table 19 lists the defaults for accessing hosts, devices, switches, and zones.
Table 19Access defaults
Access default
HostsAny host can access the fabric by SNMP
Any host can Telnet to any switch in the fabric
Any host can establish an HTTP connection to any switch in the fabric
Any host can establish an API connection to any switch in the fabric
DevicesAll devices can access the Management Server
Any device can connect to any FC port in the fabric
Switch accessAny switch can join the fabric
All switches in the fabric can be accessed through a serial port
ZoningNo zoning is enabled
86Configuring standard security features
Port configuration
The following Table provides information on ports that the switch uses. When configuring the switch for
various policies, take into consideration firewalls and other devices that may sit between switches in the
fabric and your network or between the managers and the switch.
PortTypeCommon useComment
22TCPSSH
23TCPTelnetUse the ipfilter command to block the port.
12 3T CPN T P
80 TCPHTTP Use the ipfilter command to block the port.
111TCPsunrpc This port is used by Platform API. Use the ipfilter
161UDPSNMP Disable the SNMP service on the remote host if you do not
443TCPHTTPSUse the ipfilter command to block the port.
512T C Pe x e c
513T C Pl o g i n
514T C Ps h e l l
897TCPThis port is used by the Platform API. Disable this port using
command to block the port.
use it, or filter incoming UDP packets going to this port.
the configure command.
Configuring for the SSL protocol
Fabric OS 4.4.0 and later supports secure sockets layer (SSL) protocol, which provides secure access to a
fabric through Web-based management tools like Web Tools. SSL support is a standard Fabric OS feature.
Switches configured for SSL grant access to management tools through hypertext transfer protocol-secure
links (which begin with https://) instead of standard links (which begin with http://).
SSL uses Public Key Infrastructure (PKI) encryption to protect data transferred over SSL connections. PKI is
based on digital certificates obtained from an Internet Certificate Authority (CA), which acts as the trusted
key agent.
Certificates are based on the switch IP address or fully qualified domain name (FQDN), depending on the
issuing CA. If you change a switch IP address or FQDN after activating an associated certificate, you may
have to obtain and install a new certificate. Check with the CA to verify this possibility, and plan these
types of changes accordingly.
Browser and Java support
Fabric OS supports the following Web browsers for SSL connections:
• Internet Explorer (Microsoft Windows)
• Mozilla (Solaris and Red Hat Linux)
In countries that allow the use of 128-bit encryption, you should use the latest version of your browser. For
example, Internet Explorer 6.0 and later supports 128-bit encryption by default. You can display the
encryption support (called “cipher strength”) using the Internet Explorer Help:About menu option. If you
are running an earlier version of Internet Explorer, you may be able to download an encryption patch from
the Microsoft website at http://www.microsoft.com
.
You should upgrade to the Java 1.5.0_06 Plug-in on your management workstation. To find the Java
version that is currently running, open the Java console and look at the first line of the window.
For more details on levels of browser and Java support, see the Web Tools Administrator’s Guide.
Fabric OS 6.x administrator guide87
Summary of SSL procedures
You configure for SSL by obtaining, installing, and activating digital certificates for SSL support. Certificates
are required on all switches that are to be accessed through SSL.
You also need to install a certificate in the Java Plug-in on the management workstation, and you may need
to add a certificate to your Web browser.
Configuring for SSL involves these major steps, which are shown in detail in the next sections.
1. Choose a Certificate Authority (CA).
2. Generate the following items on each switch:
a. A public/private key (secCertUtil genkey command).
b. A certificate signing request (CSR) (secCertUtil gencsr command) and store the CSR on an
FTP server (secCertUtil export command).
3. Obtain the certificates from the CA.
You can request a certificate from a CA through a Web browser. After you request a certificate, the CA
either sends certificate files by e-mail (public) or gives access to them on a remote host (private).
Typically, the CA provides the certificate files listed in Table 20.
Table 20SSL certificate files
Certificate fileDescription
name.crtThe switch certificate.
nameRoot.crtThe root certificate. Typically, this certificate is already installed in the
browser, but if not, you must install it.
nameCA.crtThe CA certificate. It needs to be installed in the browser to verify the
validity of the server certificate or server validation fails.
4. On each switch, install and then activate the certificate.
5. If necessary, install the root certificate to the browser on the management workstation.
6. Add the root certificate to the Java Plug-in keystore on the management workstation.
Choosing a CA
To ease maintenance and allow secure out-of-band communication between switches, consider using one
CA to sign all management certificates for a fabric. If you use different CAs, management services operate
correctly, but the Web Tools Fabric Events button is unable to retrieve events for the entire fabric.
Each CA (for example, Verisign or GeoTrust) has slightly different requirements; for example, some
generate certificates based on IP address, while others require an FQDN, and most require a 1024-bit
public/private key while some may accept a 2048-bit key. Consider your fabric configuration, check CA
websites for requirements, and gather all the information that the CA requires.
Generating a public/private key
Perform this procedure on each switch.
1. Connect to the switch and log in as admin.
2. Enter this command to generate a public/private key pair:
switch:admin> seccertutil genkey
The system reports that this process will disable secure protocols, delete any existing CSR, and delete
any existing certificates.
3. Respond to the prompts to continue and select the key size:
Continue (yes, y, no, n): [no] y
Select key size [1024 or 2048]:
Generating new rsa public/private key pair
Done.
1024
88Configuring standard security features
IMPORTANT: HP recommends selecting 1024 in most cases. CA support for the 2048-bit key size is
limited.
Generating and storing a CSR
After generating a public/private key, perform this procedure on each switch.
1. Connect to the switch and log in as admin.
2. Enter this command:
switch:admin> seccertutil gencsr
3. Enter the requested information:
Country Name (2 letter code, eg, US):US
State or Province Name (full name, eg, California):California
Locality Name (eg, city name):San Jose
Organization Name (eg, company name):Brocade
Organizational Unit Name (eg, department name):Eng
Common Name (Fully qualified Domain Name, or IP address): 192.1.2.3
Generating CSR, file name is: 192.1.2.3.csr
Done.
Your CA may require specific codes for Country, State or Province, Locality, Organization, and
Organizational Unit names. Make sure that your spelling is correct and matches the CA requirements.
If the CA requires that the Common Name be specified as an FQDN, make sure that the fully qualified
domain name is set on the domain name server.
4. Enter this command to store the CSR:
switch:admin> seccertutil export
5. Enter the requested information:
Select protocol [ftp or scp]: ftp
Enter IP address: 192.1.2.3
Enter remote directory: path_to_remote_directory
Enter Login Name: your account
Enter Password: your password
Success: exported CSR.
If you are set up for secure file copy protocol, you can select it; otherwise, select ftp. Enter the IP
address of the switch on which you generated the CSR. Enter the remote directory name of the FTP
server to which the CSR is to be sent. Enter your account name and password on the server.
Obtaining certificates
Check the instructions on the CA website; then, perform this procedure for each switch.
1. Generate and store the CSR as described in ”Generating and storing a CSR” on page 89.
2. Open a Web browser window on the management workstation and go to the CA website. Follow the
instructions to request a certificate. Locate the area in the request form into which you are to paste the
CSR.
3. Through a Telnet window, connect to the switch and log in as admin.
4. Enter this command:
switch:admin> seccertutil showcsr
The contents of the CSR are displayed.
5. Locate the section that begins with “BEGIN CERTIFICATE REQUEST” and ends with “END CERTIFICATE
REQUEST”.
6. Copy and paste this section (including the BEGIN and END lines) into the area provided in the request
form; then, follow the instructions to complete and send the request.
Fabric OS 6.x administrator guide89
It may take several days to receive the certificates. If the certificates arrive by e-mail, save them to an
FTP server. If the CA provides access to the certificates on an FTP server, make note of the path name
and make sure you have a login name and password on the server.
Installing a switch certificate
Perform this procedure on each switch.
1. Connect to the switch and log in as admin.
2. Enter this command:
switch:admin> seccertutil import
3. Select a protocol, enter the IP address of the host on which the switch certificate is saved, and enter
your login name and password:
Select protocol [ftp or scp]: ftp
Enter IP address:
Enter remote directory: path_to_remote_directory
Enter certificate name (must have ".crt" suffix):
Enter Login Name: your_account
Enter Password: *****
Success: imported certificate [192.1.2.3.crt].
192.10.11.12
To use this certificate, run the configure command to activate it. The certificate is downloaded to the
switch.
Activating a switch certificate
192.1.2.3.crt
1. Enter the configure command
2. When the ssl attributes comes up, type y
3. Respond to the prompts that apply to SSL certificates:
SSL attributesEnter y or yes.
Certificate FileEnter the name of the switch certificate file: for example,
192.1.2.3.crt.
CA Certificate FileIf you want the CA name to be displayed in the browser
window, enter the name of the CA certificate file; otherwise, skip
this prompt.
Select length of crypto key Enter the encryption key length (40, 56, or 128).
HTTP attributesEnter yes.
Secure HTTP enabledEnter yes.
For example:
Configure...
System services (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
Certificate File. (filename or none): [10.33.13.182.crt]
CA Certificate File. (filename or none): [none]
Select length of crypto key.
(Valid values are 40, 56, and 128.): (40..128) [128]
http attributes (yes, y, no, n): [no]
HTTP Enabled (yes, y, no, n): [yes]
Secure HTTP Enabled (yes, y, no, n): [no]
yes
192.1.2.3.crt
yes
no
yes
After you exit the configure command, the HTTP daemon restarts automatically to handle HTTPS
requests.
90Configuring standard security features
Configuring the browser
The root certificate may already be installed on your browser, but if not, you must install it. To see whether
it is already installed, check the certificate store on your browser.
The next procedures are guides for installing root certificates to Internet Explorer and Mozilla browsers. For
more detailed instructions, refer to the documentation that came with the certificate.
To check and install root certificates on Internet Explorer:
1. From the browser Tools menu, select Internet Options.
2. Click the Content tab.
3. Click Certificates.
4. Click the Intermediate certification authorities or Trusted Root certification authorities tabs and scroll the
lists to see if the root certificate is listed. If it is listed, you do not need to install it, forgo the remainder
of this procedure.
5. If the certificate is not listed, click Import.
6. Follow the instructions in the Certificate Import wizard to import the certificate.
To check and install root certificates on Mozilla:
1. From the browser Edit menu, select Preferences.
2. In the left pane of the Preferences window, expand the Privacy & Security list and select
Certificates.
3. In the right pane, click Manage Certificates.
4. In the next window, click the Authorities tab.
5. Scroll the authorities list to see if the root certificate is listed. (For example, its name may have the form
nameRoot.crt.) If it is listed, you do not need to install it; forgo the remainder of this procedure.
6. If the certificate is not listed, click Import.
7. Browse to the certificate location and select the certificate. (For example, select nameRoot.crt.)
8. Click Open and follow the instructions to import the certificate.
Installing a root certificate to the Java plug-in
For information on Java requirements, see ”Browser and Java support” on page 87.
This procedure is a guide for installing a root certificate to the Java Plug-in on the management
workstation. If the root certificate is not already installed to the plug-in, you should install it. For more
detailed instructions, refer to the documentation that came with the certificate and to the Sun Microsystems
website, www.sun.com
1. Copy the root certificate file from its location on the FTP server to the Java Plug-in bin. For example, the
bin location may be:
C: \program files\java\j2re1.5.0_06\bin
2. Open a command prompt window and change directory to the Java Plug-in bin.
3. Enter the keytool command and respond to the prompts:
-file RootCert.crt -keystore ..\lib\security\RootCerts
Enter keystore password: changeit
Owner: CN=Brocade, OU=Software, O=Brocade Communications, L=San Jose,
ST=California, C=US
Issuer: CN=Brocade, OU=Software, O=Brocade Communications, L=San Jose,
ST=California, C=US
Serial number: 0
Valid from: Thu Jan 15 16:27:03 PST 2007 until: Sat Feb 14 16:27:03 PST
2007
Certificate fingerprints:
MD5: 71:E9:27:44:01:30:48:CC:09:4D:11:80:9D:DE:A5:E3
SHA1:
06:46:C5:A5:C8:6C:93:9C:FE:6A:C0:EC:66:E9:51:C2:DB:E6:4F:A1
.
Fabric OS 6.x administrator guide91
Trust this certificate? [no]: yes
Certificate was added to keystore
In the example, changeit is the default password and RootCert is an example root certificate
name.
Displaying and deleting certificates
Table 21 summarizes the commands for displaying and deleting certificates. For details on the commands,
see the Fabric OS Command Reference.
Table 21 Commands for displaying and deleting SSL certificates
CommandDescription
secCertUtil show Displays the state of the SSL key and a list of installed certificates
secCertUtil show
filename
secCertUtil showcsr Displays the contents of a CSR
secCertUtil delete
filename
secCertUtil delcsr Deletes a CSR
Troubleshooting certificates
If you receive messages in the browser or in a pop-up window when logging in to the target switch using
HTTPS, refer to <Link>Table 22 for recommended actions you can take.
Table 22SSL messages and actions
Message Action
The page cannot be displayedThe SSL certificate is not installed correctly or HTTPS is not
The security certificate was issued by a
company you have not chosen to trust….
The security certificate has expired or is not
yet valid
Displays the contents of a specific certificate
Deletes a specified certificate
enabled correctly. Make sure that the certificate has not
expired, that HTTPS is enabled, and that certificate file
names are configured correctly.
The certificate is not installed in the browser. Install it as
described in ”Configuring the browser” on page 91.
Either the certificate file is corrupted or it needs to be
updated. Click View Certificate to verify the certificate
content. If it is corrupted or out of date, obtain and install a
new certificate.
The name on the security certificate is
invalid or does not match the name of the
site file
This page contains both secure and
nonsecure items. Do you want to display
the nonsecure items?
92Configuring standard security features
The certificate is not installed correctly in the Java Plug-in.
Install it as described in ”Installing a root certificate to the
Java plug-in” on page 91.
Click No in this pop-up window. The session opens with a
closed lock icon on the lower-right corner of the browser,
indicating an encrypted connection.
Configuring for SNMP
You can configure for the automatic transmission of SNMP information to management stations. SNMPv3
and SNMPv1 are supported.
The configuration process involves configuring the SNMP agent and configuring SNMP traps. The
following commands are used in the process:
• Use the configure command to set the security level. You can specify no security, authentication only,
or authentication and privacy.
• Use the snmpConfig command to configure the SNMP agent and traps for SNMPv3 or SNMPv1
configurations.
• If necessary for backward compatibility, you can use these legacy commands to configure for SNMP
v1:
•Use the agtCfgShow, agtCfgset, and agtCfgDefault commands to configure the SNMPv1
agent.
•Use the snmpMibCapSet command to filter at the trap level.
The SNMP trap configuration specifies the MIB trap elements to be used to send information to the SNMP
management station. There are two main MIB trap choices:
• Brocade-specific MIB trap
Associated with the Brocade-specific MIB (SW-MIB), this MIB monitors Brocade (HP) switches
specifically.
• FibreAlliance MIB trap
Associated with the FibreAlliance MIB (FA-MIB), this MIB manages SAN switches and devices from any
company that complies with FibreAlliance specifications.
If you use both SW-MIB and FA-MIB, you may receive duplicate information. You can disable the FA-MIB,
but not the SW-MIB.
You can also use these additional MIBs and their associated traps:
• FICON-MIB (for FICON environments)
• SW-EXTTRAP
Includes the swSsn (Software Serial Number) as a part of Brocade SW traps.
For information on Brocade MIBs, see the Fabric OS MIB Reference.
For information on the specific commands used in these procedures, see online help or the Fabric OS
Command Reference.
Setting the security level
Use the configure command to set the security level (called “SNMP attributes”). You can specify no
security, authentication only, or authentication and privacy. For example, to configure for authentication
and privacy:
Stealth200E:admin> configure
Not all options will be available on an enabled switch.
To disable the switch, use the "switchDisable" command.
Configure...
System services (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
rpcd attributes (yes, y, no, n): [no]
cfgload attributes (yes, y, no, n): [no] y
Enforce secure config Upload/Download (yes, y, no, n): [no]
Enforce signature validation for firmware (yes, y, no, n): [no]
Fabric OS 6.x administrator guide93
webtools attributes (yes, y, no, n): [no]
System (yes, y, no, n): [no]
No changes.
Using the snmpConfig command
4. Use the snmpConfig --set command to change either the SNMPv3 or SNMPv1 configuration. You
can also change access control, MIB capability, and system group.
Sample SNMPv3 configuration
switch:admin> snmpconfig --set snmpv3
SNMPv3 user configuration:
User (rw): [snmpadmin1] adminuser
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] 1
New Auth Passwd:
Verify Auth Passwd:
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/
switch:admin> snmpconfig --default systemGroup
*****
This command will reset the agent's system group configuration back
to factory default
*****
sysDescr = Fibre Channel Switch
sysLocation = End User Premise
sysContact = Field Support
authTraps = 0 (OFF)
*****
Are you sure? (yes, y, no, n): [no] y
Configuring secure file copy
You can use the configure command to specify that secure file copy (SCP) is used for configuration
uploads and downloads.
For example:
switch:admin> configure
Not all options will be available on an enabled switch.
To disable the switch, use the "switchDisable" command.
Configure...
System services (yes, y, no, n): [no] n
ssl attributes (yes, y, no, n): [no] n
http attributes (yes, y, no, n): [no] n
snmp attributes (yes, y, no, n): [no] n
rpcd attributes (yes, y, no, n): [no] n
cfgload attributes (yes, y, no, n): [no] y
Enforce secure config Upload/Download (yes, y, no, n): [no]
Enforce signature validation for firmware (yes, y, no, n):
[no]switch:admin>
96Configuring standard security features
4Configuring advanced security features
This chapter provides information and procedures for configuring advanced Fabric OS security features
such as Access Control List (ACL) policies, authentication policies, and IP Filtering for HP’s Fibre Channel
switches.
NOTE: Run all commands, with the suggested role, in this chapter by logging in to Administrative Domain
(AD) 255 or, if Administrative Domains have not been implemented, log in to AD 0.
About access control list (ACL) policies
Fabric OS provides the following policies:
• Fabric Configuration Server (FCS) policy—Used to restrict which switches can change the
configuration of the fabric.
• Device Connection Control (DCC) policies—Used to restrict which Fibre Channel device ports can
connect to which Fibre Channel switch ports.
• Switch Connection Control (SCC) policy—Used to restrict which switches can join with a switch.
• IP Filter Policy (IPFilter) policy—Used to filter traffic based on IP addresses.
Each supported policy is identified by a specific name, and only one policy of each type can exist (except
for DCC policies). Policy names are case-sensitive and must be entered in all uppercase.
How the ACL policies are stored
The policies are stored in a local database. The database contains the ACL policies types of FCS, DCC,
SCC, and IPFilter. The number of policies that may be defined is limited by the size of the database. FCS,
SCC and DCC policies are all stored in the same database.
When a Fabric OS 6.0 switch joins the fabric containing only pre-6.0 switches, the policy database size
limit is restricted to the Fabric OS version’s lowest database size. Table 23 shows the Fabric OS version
and its associated database size restriction. Distribution of any of the given policies to pre-6.0 switches
would fail if the size of the database being distributed is greater than the lowest database size in the
fabric. In a fabric with only Fabric OS 6.0 switches present, the limit for security policy database size
would be set to 1Mb. In this case, the pre-6.0 switches cannot join the fabric if the fabric security database
size is greater than their Fabric OS database size.
Table 23 Security database size restrictions
Fabric OS versionSecurity database size
4.4256K
5.1/5.2/5.3256K
6.01Mb
The policies are grouped by state and type. A policy can be in either of the following states:
• Active—The policy is being enforced by the switch.
• Defined—The policy has been set up but is not enforced.
A group of policies is called a Policy Set. Each switch has the following two sets:
• Active policy set—Contains ACL policies being enforced by the switch.
• Defined policy set—Contains a copy of all ACL policies on the switch.
When a policy is activated, the defined policy either replaces the policy with the same name in the active
set or becomes a new active policy. If a policy appears in the defined set but not in the active set, the
policy was saved but has not been activated. If a policy with the same name appears in both the defined
Fabric OS 6.x administrator guide99
and active sets but they have different values, then the policy has been modified but the changes have not
been activated.
Admin Domain considerations: ACL management can be done on AD255 and in AD0 only if other
there are no user-defined Admin Domains. Both AD0 (when no other user-defined Admin Domains exist)
and AD255 provide an unfiltered view of the fabric.
Identifying policy members
Specify the FCS, DCC and SCC policy members by device port WWN, switch WWN, Domain IDs, or
switch names, depending on the policy. The valid methods for specifying policy members are listed in
Table 24.
Table 24 Valid methods for specifying policy members
Policy nameDevice port
FCS _ POL ICYNoYesYesYes
DCC_POLICY_nnnYe sYesYesYes
SCC_POLICYN oYesYesYes
Configuring ACL policies
All policy modifications are saved in volatile memory until those changes are saved or activated. You can
create multiple sessions to the switch from one or more hosts. It is recommended to make changes from one
switch only to avoid having multiple transactions from occurring.
The FCS, SCC and DCC policies in Secure Fabric OS are not interchangeable with Fabric OS FCS, SCC
and DCC policies. Uploading and saving a copy of the Fabric OS configuration after creating policies is
strongly recommended. Use the configUpload command to upload a copy of the configuration file. For
more information on how to use this command, see the ”Maintaining Configurations” on page 131.
NOTE: All changes, including the creation of new policies, are saved and activated on the local switch
only—unless the switch is in a fabric that has a strict or tolerant fabric-wide consistency policy for the ACL
policy type for SCC or DCC. See ”Distributing the policy database” on page 121 for more information on
the database settings and fabric-wide consistency policy.
WWN
Switch
WWN
Domain IDSwitch
name
Use the instructions in the following sections to manage common settings between two or more of the DCC,
FCS, and SCC policies. For instructions relating to a specific policy, refer to the appropriate section.
• ”Displaying ACL policies” on page 101
Displays a list of all active and defined ACL policies on the switch.
• ”Saving changes to ACL policies” on page 108
Save changes to memory without actually implementing the changes within the fabric or to the switch.
This saved but inactive information is known as the “defined policy set.”
• ”Activating changes to ACL policies” on page 108
Simultaneously save and implement all the policy changes made since the last time changes were
activated. The activated policies are known as the “active policy set.”
• ”Adding a member to an existing policy” on page 108
Add one or more members to a policy. The aspect of the fabric covered by each policy is closed to
access by all devices and switches that are not listed in that policy.
• ”Removing a member from an ACL policy” on page 109
Remove one or more members from a policy. If all members are removed from a policy, that aspect of
the fabric becomes closed to all access.
• ”Deleting an ACL policy” on page 109
Delete an entire policy; deleting a policy opens up that aspect of the fabric to all access.
100 Configuring advanced security features
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.